SlideShare a Scribd company logo
Welcome to the Azure Sentinel webinar
We will start at 2-3 minutes after the scheduled time to accommodate those
still connecting.
Questions? Feel free to type them in the instant message window at any time. Note that any
questions you post will be public. You have the option to post questions anonymously. After
the webinar, you can ask questions at https://aka.ms/AzureSentinelCommunity.
This webinar is being recorded. We’ll post the recordings to our community forums at
https://aka.ms/SecurityWebinars.
Please give us your feedback on this webinar at
https://aka.ms/SecurityCommunityWebinarFeedback.
Join our Community: https://aka.ms/SecurityCommunity
Threat Hunting on AWS
using Azure Sentinel
AWS CloudTrail
Customizable workbooks
Built-in queries and analytics rules
Blog Link
Threat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure Sentinel
Introduction to AWS Data Sources
Data Source Preferred Log Destination
CloudTrail CloudTrail/S3
S3 Access Logs/Object Level
Logging S3
VPC Flow Logs
S3
ELB Access Logs
S3
Route 53 DNS Logs
S3
SecurityHub Finding Format (ASFF) S3
Connect Azure Sentinel to AWS CloudTrail
Serverless Simple Cheap
Logic
Apps
  
Azure Functions
using
PowerShell
 ~ 
Logstash   
CloudTrail Demystified
S3 BucketTrailRegion
CloudTrail
Events
API
CloudTrail Schema
eventTime
eventVersion
userIdentity
eventSource
eventName
awsRegion
sourceIPAddress
userAgent
errorCode
errorMessage
requestParameters
responseElements
additionalEventData
requestID
eventID
eventType
apiVersion
managementEvent
readOnly
resources
recipientAccountId
serviceEventDetails
sharedEventID
vpcEndpointId
Threat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure Sentinel
MITRE ATT&CK Framework
Use Cases for AWS
Threat Hunting on AWS using Azure Sentinel
BACKDOOR BEHAVIOR CRYPTOCURRENCY RECON TROJAN UNAUTHORIZEDACCESS
Spambot NetworkPortUnusual BitcoinTool.B!DNS PortProbeUnprotectedPort BlackholeTraffic SSHBruteForce
C&CActivity.B!DNS TrafficVolumeUnusual BitcoinTool.B Portscan DropPoint RDPBruteForce
DenialOfService.Tcp PortProbeEMRUnprotectedPort BlackholeTraffic!DNS TorIPCaller
DenialOfService.Udp DriveBySourceTraffic!DNS MaliciousIPCaller.Custom
DenialOfService.Dns DropPoint!DNS TorClient
DenialOfService.UdpOnTcpPorts DGADomainRequest.B TorRelay
DenialOfService.UnusualProtocol DGADomainRequest.C!DNS MetadataDNSRebind
DNSDataExfiltration
PhishingDomainRequest!DNS
RECON
UNAUTHORIZED
ACCESS
PENTEST PERSISTENCE POLICY
PRIVILEGE
ESCALATION
RESOURCE
CONSUMPTION
STEALTH
TorIPCaller TorIPCaller KaliLinux NetworkPermissions
S3BlockPublic
AccessDisabled
Administrative
Permissions
ComputeResources
S3ServerAccessLogging
Disabled
MaliciousIPCaller.Custom MaliciousIPCaller.Custom ParrotLinux ResourcePermissions RootCredentialUsage PasswordPolicyChange
MaliciousIPCaller ConsoleLoginSuccess.B PentooLinux UserPermissions CloudTrailLoggingDisabled
NetworkPermissions MaliciousIPCaller
LoggingConfiguration
Modified
ResourcePermissions ConsoleLogin
UserPermissions
InstanceCredential
Exfiltration
Low Medium High
Failed AzureAD logons but
success logon to AWS
Console
New UserAgent observed
in last 24 hours
Changes to internet facing
AWS RDS Database
instances
Changes to
Amazon VPC
settings
Login to AWS
Management Console
without MFA
MFA disabled for a user
Tracking Privileged
Account Rare Activity
Suspicious Data Access
to S3 Bucket from
Unknown IP
S3 Bucket outbound
Data transfer
anomaly
Failed AWS Console
logons but success logon
to AzureAD
Exploit and Pentest
Framework User Agent
Changes to AWS Elastic
Load Balancer security
groups
Tracking Privileged
Account Rare
Activity
Changes to Amazon
VPC settings
Failed AzureAD logons but
success logon to
AWS Console
Monitor AWS
Credential abuse
or hijacking
Login to AWS Management
Console without MFA
Changes to AWS Security
Group ingress and egress
settings
Changes made to AWS
IAM policy
Changes made to
AWS IAM policy
Failed AWS Console
logons but success logon
to AzureAD
Changes to Amazon
VPC settings
Privileged role
attached to
Instance
Suspicious credential
token access of valid
IAM Roles
Known IRIDIUM IP
Suspicious credential
token access of valid
IAM Roles
Changes made to
AWS CloudTrail logs
(Preview) TI map IP entity
to AWSCloudTrail
New UserAgent observed
in last 24 hours
Exploit and Pentest
Framework User Agent
Known IRIDIUM IP
(Preview) TI map IP entity
to AWSCloudTrail
INITIAL
ACCESS
EXECUTION PERSISTENCE
PRIVILEGE
ESCALATION
DEFENSE
EVASION
CREDENTIAL
ACCESS
DISCOVERY COLLECTION EXFILTRATION
Low Medium High HuntingQuery
Demo :
Threat Hunting on Leaked Access
key/Compromised user
Threat Hunting on AWS using Azure Sentinel
• 4/20/2020, 4:32:08.000 AM: CreateRole
• 4/20/2020, 4:32:08.000 AM: CreatePolicy
• 4/20/2020, 4:32:12.000 AM: AttachRolePolicy
• 4/20/2020, 5:08:51.000 AM: ListInstanceProfile
• 4/20/2020, 5:10:08.000 AM : ListRole
• 4/20/2020, 5:12:32.000 AM: RemoveRoleToInstance
• 4/20/2020, 5:13:28.000 AM: AddRoleToInstance
• 4/20/2020, 9:10:45.000 AM: Create Key Pair
• 4/20/2020, 9:25:13.000 AM: DescribeInstances
• 4/20/2020, 9:15:20.000 AM: Run Instances
• 4/20/2020, 9:26:47.000 AM: TerminateInstances
iam_privesc_by_attachment
http://aka.ms/azuresentinelthreathunters
 Azure for AWS Professionals
 What is AWS CloudTrail ?
MITRE ATT&CK Enterprise Matrix
OSSEM : Data dictionary for AWS Cloud Data sources
Guardduty Active Finding Types
Cloudgoat Scenario : iam_privesc_by_attachment
Thank You for Joining Us!
Recordings will be posted to our community forums at
https://aka.ms/SecurityWebinars.
You can ask additional questions at https://aka.ms/AzureSentinelCommunity.
Please give us your feedback on this webinar at
https://aka.ms/SecurityCommunityWebinarFeedback.
Join our Community: https://aka.ms/SecurityCommunity
For any questions or comments on our documentation (https://docs.microsoft.com)
contact directly at MSsecuritydocs@microsoft.com

More Related Content

PPTX
Microsoft Defender for Endpoint Overview.pptx
PPTX
Azure Identity and access management
PPTX
SOAR and SIEM.pptx
PDF
SIEM Architecture
PPTX
Azure sentinel
PDF
Microsoft Defender and Azure Sentinel
PDF
Bulding Soc In Changing Threat Landscapefinal
PDF
Global Cyber Threat Intelligence
Microsoft Defender for Endpoint Overview.pptx
Azure Identity and access management
SOAR and SIEM.pptx
SIEM Architecture
Azure sentinel
Microsoft Defender and Azure Sentinel
Bulding Soc In Changing Threat Landscapefinal
Global Cyber Threat Intelligence

What's hot (20)

PPTX
Azure Sentinel.pptx
PPTX
Vulnerability Management
PPTX
SEIM-Microsoft Sentinel.pptx
PDF
Microsoft Azure Sentinel
PDF
Introduction to Azure Sentinel
PPTX
Cloud Security
PPTX
Microsoft Defender for Endpoint
PPT
The Security Vulnerability Assessment Process & Best Practices
PPTX
Security Information and Event Management (SIEM)
PPTX
Cloud Storage in Azure, AWS and Google Cloud
PDF
Proactive cyber defence through adversary emulation for improving your securi...
PDF
IBM QRadar Security Intelligence Overview
PPTX
F5 - BigIP ASM introduction
PPTX
Azure Sentinel
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
Azure 101
PPTX
Security Information and Event Managemen
PPT
IDS and IPS
PPTX
EDR(End Point Detection And Response).pptx
PDF
F5 Web Application Security
Azure Sentinel.pptx
Vulnerability Management
SEIM-Microsoft Sentinel.pptx
Microsoft Azure Sentinel
Introduction to Azure Sentinel
Cloud Security
Microsoft Defender for Endpoint
The Security Vulnerability Assessment Process & Best Practices
Security Information and Event Management (SIEM)
Cloud Storage in Azure, AWS and Google Cloud
Proactive cyber defence through adversary emulation for improving your securi...
IBM QRadar Security Intelligence Overview
F5 - BigIP ASM introduction
Azure Sentinel
Building a Next-Generation Security Operations Center (SOC)
Azure 101
Security Information and Event Managemen
IDS and IPS
EDR(End Point Detection And Response).pptx
F5 Web Application Security
Ad

Similar to Threat Hunting on AWS using Azure Sentinel (20)

PPTX
Adam ochs sentinel
PPTX
Modernize your Security Operations with Azure Sentinel
PPTX
Alfredo Reino - Monitoring aws and azure
PPTX
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
PDF
introduction to Azure Sentinel
PPTX
test-sgsgsgs.pptx
PDF
Azure Sentinel Tips
PPTX
NVS_Sentinel
PDF
Manage Security & Compliance of Your AWS Account using CloudTrail
PDF
SBA Security Meetup - Deploying and managing azure sentinel as code by Bojan ...
PPTX
[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx
PPTX
Azure Sentinel with Office 365
PDF
L400-P1 Overview.pdf
PDF
do you want to know about what is Microsoft Sentinel.pdf
PPTX
Owning aws infrastructure services
PPTX
TechTalksUtah-Sentinel-20191108.pptx
PDF
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
PDF
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
PPTX
Azure Sentinel Jan 2021 overview deck
PDF
Azure Day Rome Reloaded 2019 - Azure Sentinel: set up automated threat respon...
Adam ochs sentinel
Modernize your Security Operations with Azure Sentinel
Alfredo Reino - Monitoring aws and azure
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
introduction to Azure Sentinel
test-sgsgsgs.pptx
Azure Sentinel Tips
NVS_Sentinel
Manage Security & Compliance of Your AWS Account using CloudTrail
SBA Security Meetup - Deploying and managing azure sentinel as code by Bojan ...
[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx
Azure Sentinel with Office 365
L400-P1 Overview.pdf
do you want to know about what is Microsoft Sentinel.pdf
Owning aws infrastructure services
TechTalksUtah-Sentinel-20191108.pptx
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Azure Sentinel Jan 2021 overview deck
Azure Day Rome Reloaded 2019 - Azure Sentinel: set up automated threat respon...
Ad

Recently uploaded (20)

PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PDF
Mega Projects Data Mega Projects Data
PPTX
Introduction to machine learning and Linear Models
PDF
Business Analytics and business intelligence.pdf
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PDF
annual-report-2024-2025 original latest.
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPT
Quality review (1)_presentation of this 21
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
oil_refinery_comprehensive_20250804084928 (1).pptx
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Mega Projects Data Mega Projects Data
Introduction to machine learning and Linear Models
Business Analytics and business intelligence.pdf
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Introduction-to-Cloud-ComputingFinal.pptx
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
annual-report-2024-2025 original latest.
Galatica Smart Energy Infrastructure Startup Pitch Deck
Quality review (1)_presentation of this 21
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx

Threat Hunting on AWS using Azure Sentinel

  • 1. Welcome to the Azure Sentinel webinar We will start at 2-3 minutes after the scheduled time to accommodate those still connecting. Questions? Feel free to type them in the instant message window at any time. Note that any questions you post will be public. You have the option to post questions anonymously. After the webinar, you can ask questions at https://aka.ms/AzureSentinelCommunity. This webinar is being recorded. We’ll post the recordings to our community forums at https://aka.ms/SecurityWebinars. Please give us your feedback on this webinar at https://aka.ms/SecurityCommunityWebinarFeedback. Join our Community: https://aka.ms/SecurityCommunity
  • 2. Threat Hunting on AWS using Azure Sentinel
  • 3. AWS CloudTrail Customizable workbooks Built-in queries and analytics rules Blog Link
  • 6. Introduction to AWS Data Sources
  • 7. Data Source Preferred Log Destination CloudTrail CloudTrail/S3 S3 Access Logs/Object Level Logging S3 VPC Flow Logs S3 ELB Access Logs S3 Route 53 DNS Logs S3 SecurityHub Finding Format (ASFF) S3
  • 8. Connect Azure Sentinel to AWS CloudTrail
  • 9. Serverless Simple Cheap Logic Apps    Azure Functions using PowerShell  ~  Logstash   
  • 16. MITRE ATT&CK Framework Use Cases for AWS
  • 18. BACKDOOR BEHAVIOR CRYPTOCURRENCY RECON TROJAN UNAUTHORIZEDACCESS Spambot NetworkPortUnusual BitcoinTool.B!DNS PortProbeUnprotectedPort BlackholeTraffic SSHBruteForce C&CActivity.B!DNS TrafficVolumeUnusual BitcoinTool.B Portscan DropPoint RDPBruteForce DenialOfService.Tcp PortProbeEMRUnprotectedPort BlackholeTraffic!DNS TorIPCaller DenialOfService.Udp DriveBySourceTraffic!DNS MaliciousIPCaller.Custom DenialOfService.Dns DropPoint!DNS TorClient DenialOfService.UdpOnTcpPorts DGADomainRequest.B TorRelay DenialOfService.UnusualProtocol DGADomainRequest.C!DNS MetadataDNSRebind DNSDataExfiltration PhishingDomainRequest!DNS RECON UNAUTHORIZED ACCESS PENTEST PERSISTENCE POLICY PRIVILEGE ESCALATION RESOURCE CONSUMPTION STEALTH TorIPCaller TorIPCaller KaliLinux NetworkPermissions S3BlockPublic AccessDisabled Administrative Permissions ComputeResources S3ServerAccessLogging Disabled MaliciousIPCaller.Custom MaliciousIPCaller.Custom ParrotLinux ResourcePermissions RootCredentialUsage PasswordPolicyChange MaliciousIPCaller ConsoleLoginSuccess.B PentooLinux UserPermissions CloudTrailLoggingDisabled NetworkPermissions MaliciousIPCaller LoggingConfiguration Modified ResourcePermissions ConsoleLogin UserPermissions InstanceCredential Exfiltration Low Medium High
  • 19. Failed AzureAD logons but success logon to AWS Console New UserAgent observed in last 24 hours Changes to internet facing AWS RDS Database instances Changes to Amazon VPC settings Login to AWS Management Console without MFA MFA disabled for a user Tracking Privileged Account Rare Activity Suspicious Data Access to S3 Bucket from Unknown IP S3 Bucket outbound Data transfer anomaly Failed AWS Console logons but success logon to AzureAD Exploit and Pentest Framework User Agent Changes to AWS Elastic Load Balancer security groups Tracking Privileged Account Rare Activity Changes to Amazon VPC settings Failed AzureAD logons but success logon to AWS Console Monitor AWS Credential abuse or hijacking Login to AWS Management Console without MFA Changes to AWS Security Group ingress and egress settings Changes made to AWS IAM policy Changes made to AWS IAM policy Failed AWS Console logons but success logon to AzureAD Changes to Amazon VPC settings Privileged role attached to Instance Suspicious credential token access of valid IAM Roles Known IRIDIUM IP Suspicious credential token access of valid IAM Roles Changes made to AWS CloudTrail logs (Preview) TI map IP entity to AWSCloudTrail New UserAgent observed in last 24 hours Exploit and Pentest Framework User Agent Known IRIDIUM IP (Preview) TI map IP entity to AWSCloudTrail INITIAL ACCESS EXECUTION PERSISTENCE PRIVILEGE ESCALATION DEFENSE EVASION CREDENTIAL ACCESS DISCOVERY COLLECTION EXFILTRATION Low Medium High HuntingQuery
  • 20. Demo : Threat Hunting on Leaked Access key/Compromised user
  • 22. • 4/20/2020, 4:32:08.000 AM: CreateRole • 4/20/2020, 4:32:08.000 AM: CreatePolicy • 4/20/2020, 4:32:12.000 AM: AttachRolePolicy • 4/20/2020, 5:08:51.000 AM: ListInstanceProfile • 4/20/2020, 5:10:08.000 AM : ListRole • 4/20/2020, 5:12:32.000 AM: RemoveRoleToInstance • 4/20/2020, 5:13:28.000 AM: AddRoleToInstance • 4/20/2020, 9:10:45.000 AM: Create Key Pair • 4/20/2020, 9:25:13.000 AM: DescribeInstances • 4/20/2020, 9:15:20.000 AM: Run Instances • 4/20/2020, 9:26:47.000 AM: TerminateInstances iam_privesc_by_attachment
  • 24.  Azure for AWS Professionals  What is AWS CloudTrail ? MITRE ATT&CK Enterprise Matrix OSSEM : Data dictionary for AWS Cloud Data sources Guardduty Active Finding Types Cloudgoat Scenario : iam_privesc_by_attachment
  • 25. Thank You for Joining Us! Recordings will be posted to our community forums at https://aka.ms/SecurityWebinars. You can ask additional questions at https://aka.ms/AzureSentinelCommunity. Please give us your feedback on this webinar at https://aka.ms/SecurityCommunityWebinarFeedback. Join our Community: https://aka.ms/SecurityCommunity For any questions or comments on our documentation (https://docs.microsoft.com) contact directly at MSsecuritydocs@microsoft.com

Editor's Notes

  • #10: Logic Apps is very simple, but for high volumes can be expensive Azure Functions is much cheaper, but has a steeper learning curve, even if using PowerShell as the programming language. Logstash is a popular choice but requires a VM to run on