Suspicious Impossible Travel Logon - AWS

Last updated on:

About the rule

Rule Type

Advanced

Rule Description

Detects potential account compromise where the same AWS user authenticates to the Management Console from distinct geographic regions within an unrealistically short period. This behavior is often associated with credential theft or unauthorized session token use.

Severity

Critical

Rule Requirement

Criteria

e1: actionname = "Successful logon" | groupby CALLER | groupby HOSTNAME having dcount(SOURCE_COUNTRY) > 1 | last 1 IPADDRESS select e1.HOSTNAME, e1.CALLER, e1.HOSTNAME.IPADDRESS, e1.HOSTNAME.SOURCE_COUNTRY

Detection

Execution Mode

scheduled

Log Sources

AWS