text code block:event.dataset: "aws.cloudtrail" and event.outcome: "success" and aws.cloudtrail.user_identity.arn:(* and not *AWSServiceRoleForConfig*) and not aws.cloudtrail.user_identity.type: "AWSService" and event.provider: ( "sts.amazonaws.com" or "iam.amazonaws.com" or "s3.amazonaws.com" or "ec2.amazonaws.com" or "lambda.amazonaws.com" or "rds.amazonaws.com" or "dynamodb.amazonaws.com" or "kms.amazonaws.com" or "cloudtrail.amazonaws.com" ) and event.action: ( "GetCallerIdentity" or "ListUsers" or "ListRoles" or "ListAccessKeys" or "GetAccountSummary" or "ListAccountAliases" or "ListGroups" or "ListMFADevices" or "ListBuckets" or "DescribeInstances" or "DescribeRegions" or "DescribeVpcs" or "DescribeSecurityGroups" or "ListFunctions" or "DescribeDBInstances" or "DescribeDBSnapshots" or "ListTables" or "ListKeys" or "ListAliases" or "DescribeTrails" or "LookupEvents" ) and source.as.number: ( 216025 or 57138 or 207137 or 212238 or 199218 or 209103 or 209854 or 141039 or 147049 or 53314 or 60068 or 9009 or 20473 or 63949 or 39351 or 51765 or 204187 or 29066 or 206092 )
Install detection rules in Elastic Security
Detect AWS Discovery API Calls from VPN ASN for the First Time by Identity in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).