After enumerating the existing security group policies, the ingress policy for an EC2 instance is modified.
Possible Root Causes
An attacker is enabling external access to an EC2 instance to maintain persistence.
An EC2 instance is exposed to external access as a part of its normal operation.
Business Impact
Once an adversary achieves persistent access, they’ve established the opportunity to stage subsequent phases of an attack.
Steps to Verify
Validate that any modifications are authorized, given the purpose and policies governing this resource.
If review indicates possible malicious actions or high-risk configuration, revert configuration and disable credentials associated with this alert then perform a comprehensive investigation.
AWS Suspect Public EC2 Change
Possible root causes
Malicious Detection
Benign Detection
AWS Suspect Public EC2 Change
Example scenarios
AWS Suspect Public EC2 Change
Business impact
If this detection indicates a genuine threat, the organization faces significant risks:
Our interactive demo provides a deep dive into the advanced capabilities of our cybersecurity platform, showcasing real-time detection, comprehensive analysis, and proactive threat mitigation.
Don't just read about the possibilities – experience them.