Detections
- Home
- - Detections
- -DT115
- ID: DT115
- Created: 29th April 2025
- Updated: 29th April 2025
- Platform: Amazon Web Services (AWS)
- Contributor: The ITM Team
AWS Unauthorized System or Service Modification
Monitor AWS CloudTrail logs to detect unauthorized creation, modification, or deletion of compute, storage, network, or management resources. Unauthorized resource activity may indicate insider preparation for data exfiltration, illicit compute use, or unauthorized persistent access.
Where to Configure/Access
- AWS CloudTrail Console: https://console.aws.amazon.com/cloudtrail/
- AWS CloudWatch Logs Console (for log streaming and alerting): https://console.aws.amazon.com/cloudwatch/home#logsV2:log-groups
Detection Methods
Monitor CloudTrail API event types such as:
RunInstances
(EC2 instance creation)CreateVolume
(EBS volumes)CreateBucket
(S3 buckets)CreateFunction
/UpdateFunctionCode
(Lambda functions)CreateCluster
(ECS/EKS clusters)
Configure event selectors to capture management events across all regions.
Set metric filters and alarms for suspicious activity through CloudWatch.
Indicators
- Unapproved resources provisioned without matching Infrastructure as Code deployments.
- Resources created manually via console or CLI outside approved automation frameworks.
- Resources missing mandatory organizational tags (e.g., project ID, owner).
Sections
ID | Name | Description |
---|---|---|
ME028 | Delegated Access via Managed Service Providers | An organization entrusts a Managed Service Provider (MSP) with administrative or operational access to its digital environment - typically for IT support, system maintenance, or development functions. This access is often persistent, privileged, and spans sensitive infrastructure or data environments.
The means is established when MSP personnel, including potential subjects, are permitted to authenticate into the client’s environment from systems or networks entirely outside the client's visibility or jurisdiction. These MSP endpoints may be unmanaged, unmonitored, or physically located in regions where customer organization's policies, incident response authority, or legal recourse do not apply.
This creates an unobservable access channel: the subject operates from infrastructure beyond the reach of the customer organization's logging, endpoint detection, or identity correlation. The organization is therefore unable to monitor or verify who accessed what, when, or from where—rendering all downstream actions unauditable by the customer organization's internal security teams, unless mirrored within the client-controlled environment.
The exposure can be compounded by the MSP’s internal controls (or lack thereof). Weak credential custody practices, shared administrative accounts, inadequate background checks, or poor workforce segmentation create conditions where privileged misuse or unauthorized access can occur without attribution or immediate detection. The subject does not require escalation—they begin with sanctioned access and operate under delegated trust, often without the constraints applied to internal staff.
This structural dependency - privileged access held externally, without enforceable oversight - creates the necessary conditions for an insider infringement to occur with low risk of interruption or accountability. |
IF009.006 | Installing Crypto Mining Software | The subject installs and operates unauthorized cryptocurrency mining software on organizational systems, leveraging compute, network, and energy resources for personal financial gain. This activity subverts authorized system use policies, degrades operational performance, increases attack surface, and introduces external control risks.
Characteristics
Example ScenarioA subject installs a customized |