技能 CloudTrail 异常检测

CloudTrail 异常检测

v20260317
detecting-aws-cloudtrail-anomalies
通过 boto3 查询 AWS CloudTrail 事件,结合统计基线与行为分析,识别突发事件源、地理位置变化、高频失败或首次调用等异常 API 行为,生成可调查的 JSON 报告,快速发现凭证劫持与权限滥用风险。
获取技能
309 次下载
概览

Detecting AWS CloudTrail Anomalies

Overview

AWS CloudTrail records API calls across AWS services. This skill covers querying CloudTrail events with boto3's lookup_events API, building statistical baselines of normal API activity, detecting anomalies such as unusual event sources, geographic anomalies, high-frequency API calls, and first-time API usage patterns that indicate compromised credentials or insider threats.

Prerequisites

  • Python 3.9+ with boto3 library
  • AWS credentials with CloudTrail read permissions (cloudtrail:LookupEvents)
  • Understanding of AWS IAM and common API patterns
  • CloudTrail enabled in target AWS account (management events at minimum)

Steps

Step 1: Query CloudTrail Events

Use boto3 CloudTrail client's lookup_events to retrieve recent API activity with pagination.

Step 2: Build Activity Baseline

Aggregate events by user, source IP, event source, and event name to establish normal behavior patterns.

Step 3: Detect Anomalies

Flag unusual patterns: new event sources per user, first-time API calls, geographic IP changes, high error rates, and sensitive API usage (IAM, KMS, S3 policy changes).

Step 4: Generate Detection Report

Produce a JSON report with anomaly scores, top suspicious users, and recommended investigation actions.

Expected Output

JSON report with event statistics, baseline deviations, anomalous users/IPs, sensitive API calls, and error rate analysis.

信息
Category 未分类
Name detecting-aws-cloudtrail-anomalies
版本 v20260317
大小 8.66KB
更新时间 2026-03-18
语言