Reconnaissance – Pre-Intrusion - Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement

This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.

Reconnaissance – Pre-Intrusion

This phase represents the work attackers do to research and select their targets, and understand their targets’ digital footprints. This can include reconnaissance activities such as port scans and vulnerability scans of the targets’ publicly accessible systems and of their supply chain partners.

Reconnaissance pre-intrusion activities occur prior to intrusion attempts. Examples include unusual API activity, unusual patterns of failed login requests, or unblocked port probing from a known, bad IP address.

Control Objective – Detect

The objective of the Detect control in the Reconnaissance Pre-Intrusion phase is to “discover or discern the existence, presence, or fact of an intrusion into information systems.”**

Control Names Descriptions

Amazon GuardDuty

(ID: Sec.Det.1)

This control detects reconnaissance activity, such as unusual API activity, intra-VPC port scanning, unusual patterns of failed login requests, or unblocked port probing from a known, bad IP address.

Amazon GuardDuty Partners

(ID: Sec.Det.2)

These controls are a complement to Amazon GuardDuty.

AWS WAF, WAF Managed Rules + Automation

(ID: Sec.Inf.2)

Malicious sources scan and probe Internet-facing web applications for vulnerabilities. They send a series of requests that generate HTTP 4xx error codes, and you can use this history to help identify and block malicious source IP addresses.

Amazon CloudWatch, CloudWatch Logs, CloudTrail + Insights, Reporting & Third Parties

(ID: Sec.Det.6)

These controls help you to monitor, detect, visualize, receive notifications, and respond to changes in your AWS resources.

AWS Security Hub

(ID: Sec.Det.3)

This control gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.

AWS Security Hub Partners

(ID: Sec.Det.4)

AWS Security Hub APN Partner products are a complement to Amazon GuardDuty.

Honeypot and Honeynet Environments

(ID: Sec.IR.10)

These controls help to degrade, detect, and contain attacks.

Amazon Detective

(ID: Sec.Det.11)

Amazon Detective makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities. Amazon Detective automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to easily conduct faster and more efficient security investigations.

AWS Network Firewall

(ID: Sec.Inf.30)

This control detects reconnaissance activity using signature-based detection.

Control Objective – Deny

The objective of the Deny control in the Reconnaissance Pre-Intrusion phase is to “prevent the adversary from accessing and using critical information, systems, and services.”**

Control Names Descriptions

Amazon Virtual Private Cloud (Amazon VPC)

(ID: Sec.Inf.3)

Amazon VPC can help prevent attackers from scanning network resources during reconnaissance. Amazon VPC Black Hole Routes (as an allow list or deny list of network reachable assets before Security Groups or NACLs).

AWS Identity and Access Management + AWS Organizations

(ID: Sec.IAM.3)

In this context, attackers can’t execute <service>:Describe* API calls without Allow permissions.

AWS Certificate Manager + Transport Layer Security

(ID: Sec.DP.3)

Protecting data in transit denies attackers the ability to capture data in transit during the Reconnaissance phase, unless they are able to impersonate a legitimate endpoint.

Network Infrastructure Solutions in the AWS Marketplace

(ID: Sec.Inf.10)

Infrastructure solutions in the AWS Marketplace can help deny attackers access to data and infrastructure as they conduct reconnaissance.

AWS WAF, WAF Managed Rules + Automation

(ID: Sec.Inf.2)

This control is a solution that leverages automation to quickly and easily configure AWS WAF rules that help block Scanners and Probes, Known Attacker Origins, and Bots and Scrapers solutions.

AWS Direct Connect

(ID: Sec.Inf.4)

This control establishes private connectivity to multiple Amazon VPCs.

AWS Network Firewall

(ID: Sec.Inf.30)

The control blocks network scanning during the reconnaissance phase by blocking network scans and probes utilizing signature based intrusion prevention.

Control Objective – Disrupt

The objective of the Disrupt control in the Reconnaissance Pre-Intrusion phase is to “break or interrupt the flow of information.” **

Control Names Descriptions

Amazon GuardDuty + AWS Lambda

(ID: Sec.IR.1)

These controls detect reconnaissance activities and modify security configurations to block traffic associated with an attack.

AWS Network Firewall

(ID: Sec.Inf.30)

The control detects reconnaissance activity, blocking network scans and probes utilizing signature based intrusion prevention.

Control Objective – Degrade

The objective of the Degrade control in the Reconnaissance Pre-Intrusion phase is to “reduce the effectiveness or efficiency of adversary command and control (C2) or communications systems, and information collection efforts or means.”

Control Names Descriptions

Honeypot and Honeynet Environments

(ID: Sec.IR.10)

These controls help to degrade, detect, and contain attacks.

Honeywords and Honeykeys

(ID: Sec.IR.11)

When an attacker attempts to use stolen, false credentials, these controls help to detect and contain the attack, so you can recover faster.

Control Objective – Deceive

The objective of the Deceive control in the Reconnaissance Pre-Intrusion phase is to “cause a person to believe what is not true. MILDEC [military deception] seeks to mislead adversary decision makers by manipulating their perception of reality.”**

Control Names Descriptions

Honeypot and Honeynet Environments

(ID: Sec.IR.10)

These controls help to degrade, detect, and contain attacks.

Honeywords and Honeykeys

(ID: Sec.IR.11)

When an attacker attempts to use stolen, false credentials, these controls help to detect and contain the attack, so you can recover faster.

AWS WAF + AWS Lambda

(ID: Sec.IR.2)

These controls trap the endpoint to detect content scrapers and bad bots. When the endpoint is accessed, a function adds the source IP address to a block list.

Control Objective – Contain

The objective of the Contain control in the Reconnaissance Pre-Intrusion phase is “keeping something harmful under control or within limits.” **

Control Names Descriptions

Honeypot and Honeynet Environments

(ID: Sec.IR.10)

These controls help to degrade, detect, and contain attacks.

Honeywords and Honeykeys

(ID: Sec.IR.11)

When an attacker attempts to use stolen, false credentials, these controls help to detect and contain the attack, so you can recover faster.

Control Objective – Respond

The objective of the Respond control in the Reconnaissance Pre-Intrusion phase is to provide “capabilities that help to react quickly to an adversary’s or others’ IO attack or intrusion.” **

Control Names Descriptions

AWS WAF, WAF Managed Rules + Automation

(ID: Sec.Inf.2)

Malicious sources scan and probe internet-facing web applications for vulnerabilities. They send a series of requests that generate HTTP 4xx error codes. You can use this history to help identify and block malicious source IP addresses.

Amazon GuardDuty + AWS Lambda

(ID: Sec.IR.1)

These controls detect reconnaissance activities and modify security configurations to block traffic associated with an attack.

Amazon GuardDuty Partners

(ID: Sec.Det.2)

These controls are a complement to Amazon GuardDuty.

AWS Security Hub Partners

(ID: Sec.Det.4)

AWS Security Hub APN Partner products are a complement to Amazon GuardDuty.

Amazon CloudWatch Events & Alarms + Amazon SNS + SIEM Solutions

(ID: Sec.Det.7)

These controls monitor, detect, visualize, receive notification about attacks, and respond to changes in your AWS resources.