icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading AWS Security Monitoring App for Splunk
SHA256 checksum (aws-security-monitoring-app-for-splunk_3012.tgz) 933a5b6d7629fa9fcb3a985a5b7179dae75e1eeaa6317fe065d1258dce07abc8 SHA256 checksum (aws-security-monitoring-app-for-splunk_3011.tgz) 0f9e5e0d1514a9295faf4abe6104ddb7c799e8af465460dd40af0de8ee1bfba6 SHA256 checksum (aws-security-monitoring-app-for-splunk_3010.tgz) aafba27afea7eff5848b52f6dfbd9d47a9621d06e1474a08ff453d095f6145f2 SHA256 checksum (aws-security-monitoring-app-for-splunk_309.tgz) 0c57030545c5d62d9bf4a58c63c509cf49aca23b5b0f8a52efcb821af0c3fa45 SHA256 checksum (aws-security-monitoring-app-for-splunk_308.tgz) a81edc06524cedc684e3a4d4f45a53f58037232d66478203ecc5d270a60de5fb SHA256 checksum (aws-security-monitoring-app-for-splunk_307.tgz) 14016902bccb684ca48fd8938c259e2e8cbd47519043449fa33b9a7922913d34 SHA256 checksum (aws-security-monitoring-app-for-splunk_306.tgz) 4461e7de1dbf20e6a2461fa9a3eb8fc1150dd0e1d8d86a4b9aa81890af6b625f SHA256 checksum (aws-security-monitoring-app-for-splunk_305.tgz) 0bb82131a8c66afef200b9f0e01a6f61aaf4ce596a5add8e0674fa9a66f45e50 SHA256 checksum (aws-security-monitoring-app-for-splunk_304.tgz) 1095da7336e7fe41312f7a97f0e201888e8f30888621f23c56d74b817982e036 SHA256 checksum (aws-security-monitoring-app-for-splunk_303.tgz) 435f111f9529b93df21e29349f54dc717c025c00ead55e90a2ac50052f72a21e SHA256 checksum (aws-security-monitoring-app-for-splunk_302.tgz) 04f82e5e7400f13dcdb880bf62a68f9d2e429b5711398be3cf41da01f6c5bb6c SHA256 checksum (aws-security-monitoring-app-for-splunk_301.tgz) c1d69b195869fbda99123cde9a6fa4f0f5259f13989dc6fd2ac80ad248e44e7c SHA256 checksum (aws-security-monitoring-app-for-splunk_300.tgz) 0e888435d40cded9b7cf3ef97ff768fbd3abc53bb3cfae86bd75f47806fee259 SHA256 checksum (aws-security-monitoring-app-for-splunk_102.tgz) dae489a6d629dd020a41e9bf44500ea7acb2b58d11a103b251f031b298ec868d
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

AWS Security Monitoring App for Splunk

Splunk Cloud
Overview
Details
This Splunk app contains template alerts for detection of threats affecting AWS Platform environments, linked with the Mitre Attack Matrix for IaaS.

The alerts currently supported by this app and methods to test / emulate these alerts are described [here](https://gist.github.com/manasmbellani/172e44466755f73e3a01a978e30b121a#file-splunkawssecuritymon-md)

A list of alerts built within the app are also provided in the `Details` section.

Setup

To setup the splunk app, simply follow the standard Splunk steps to install the app via .spl provided.

Once the app has been installed, the alerts by default are setup to use following base searches which should be customized for user's environment via the Advanced Search > Search macros option for the app:

  • For cloudtrail logs, update macro aws_cloudtrail_search to use the correct index/sourcetype. Default value is provided below:
index=main sourcetype="aws:cloudtrail"
  • For cloudtrail field mapping, macro aws_cloudtrail_rename_fields can be updated if any field mappings are not correct

Please note that the alerts are templates only following the Mitre attack framework, and may need to be baselined for your AWS environment.

Usage

Each alert configured in the AWS Security Monitoring app for Splunk will execute every hour by default. Alerts that are triggered will be appended to a alerts.csv file within the app and the Splunk dashboard will be updated accordingly with these alerts.

To emulate the alerts, refer to the following link which contains details about all supported alerts, and how to emulate them.

List of supported Alerts

Release Notes

Version 3.0.12
April 7, 2023

Added alerts:

aws_detect_iam_login_profile_update
aws_detect_iam_login_profile_create
aws_detect_ecr_image_auth_token_get
aws_detect_ecr_new_repo_image_create

Version 3.0.11
March 26, 2023

Added 1 alert for aws_detect_ec2_ssh_public_key_addition

Version 3.0.10
March 26, 2023

Added 2 new alerts - aws_detect_iam_group_added_with_user_from_ec2, aws_detect_ec2_instances_run

Version 3.0.9
March 22, 2023

Added alert (aws_detect_iam_default_policy_version_set)

Version 3.0.8
March 18, 2023

Added new alerts aws_detect_iam_group_added_with_user, aws_detect_iam_new_policy_version_assignment

Version 3.0.7
March 15, 2023

Added new alerts: aws_detect_iam_password_policy_enumeration, aws_detect_iam_password_policy_update

Version 3.0.6
March 12, 2023

Added 4 new alerts -
aws_detect_s3_cloudtrail_bucket_lifecycle_rule_applied
aws_detect_ec2_vpc_flow_config_deleted
aws_detect_cloudwatch_log_stream_delete
aws_detect_cloudwatch_log_group_delete

Version 3.0.5
March 9, 2023

Added new alerts aws_detect_signin_credential_stuffing, aws_detect_iam_user_created, aws_detect_iam_user_deleted, aws_detect_iam_accesskey_created, aws_detect_iam_accesskey_deleted
Fixed userIdentity.userName field in renaming search macro for consistency

Version 3.0.4
March 6, 2023

Added alert for detection of cloudtrail logging disabling by disabling of cloudtrail (aws_detect_cloudtrail_trail_deleted)

Version 3.0.3
March 5, 2023

Added alert for detection of Guardduty Finding Suppression (aws_detect_guardduty_suppression_filter_creation)

Version 3.0.2
March 4, 2023

Added alert for archiving of guardduty alerts (aws_detect_guardduty_archive_findings)

Version 3.0.1
March 1, 2023

Add new alert aws_detect_lambda_function_deletion_serverless_execution
Fixed the field renaming macro so that empty fields don't break the body field

Version 3.0.0
Feb. 28, 2023

Added an alert for AWS serverless execution (aws_detect_lambda_function_creation_serverless_execution)

Version 1.0.2
Feb. 26, 2023

Added alerts aws_detect_guardduty_disable, aws_detect_cloud_infrastructure_discovery_via_golang_smogcloud


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.