Amazon Web Services (AWS)

This is the list of what AWS detect via Amazon GuardDuty (referred to as 'findings' for some reason). Not a lot of detail as to the logic but worth considering, if you are doing detection in another product, whether your use cases would cover the same events.

https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-active.html


Detecting AWS Unauthenticated Cross-Account Attacks. A bit Logrhythm specific but a useful read

https://logrhythm.com/blog/detecting-aws-unauthenticated-cross-account-attacks/



Rules in various SIEM platforms that apply to AWS use cases. Fairly easy to apply the same logic in whatever platform you are using.


Elastic

https://github.com/elastic/detection-rules/tree/main/rules/integrations/aws


Sentinel

https://github.com/Azure/Azure-Sentinel/tree/master/Detections/AWSCloudTrail

https://github.com/Azure/Azure-Sentinel/tree/master/Detections/AWSGuardDuty


Splunk

https://github.com/splunk/security_content/tree/develop/detections/cloud