Techniques
Sample rules
AWS SSM Command Document Created by Rare User
- source: elastic
- technicques:
Description
Identifies when an AWS Systems Manager (SSM) command document is created by a user who does not typically perform this action. Adversaries may create SSM command documents to execute commands on managed instances, potentially leading to unauthorized access, command and control, data exfiltration and more.
Detection logic
event.dataset: "aws.cloudtrail"
and event.provider: "ssm.amazonaws.com"
and event.action: "CreateDocument"
and event.outcome: "success"
and aws.cloudtrail.response_elements: *documentType=Command*