This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
Reconnaissance – Pre-Intrusion
This phase represents the work attackers do to research and select their targets, and understand their targets’ digital footprints. This can include reconnaissance activities such as port scans and vulnerability scans of the targets’ publicly accessible systems and of their supply chain partners.
Reconnaissance pre-intrusion activities occur prior to intrusion attempts. Examples include unusual API activity, unusual patterns of failed login requests, or unblocked port probing from a known, bad IP address.
Control Objective – Detect
The objective of the Detect control in the Reconnaissance Pre-Intrusion phase is to “discover or discern the existence, presence, or fact of an intrusion into information systems.”**
Control Names | Descriptions |
---|---|
(ID: Sec.Det.1) |
This control detects reconnaissance activity, such as unusual API activity, intra-VPC port scanning, unusual patterns of failed login requests, or unblocked port probing from a known, bad IP address. |
(ID: Sec.Det.2) |
These controls are a complement to Amazon GuardDuty. |
AWS WAF, WAF Managed Rules + Automation (ID: Sec.Inf.2) |
Malicious sources scan and probe Internet-facing web applications for vulnerabilities. They send a series of requests that generate HTTP 4xx error codes, and you can use this history to help identify and block malicious source IP addresses. |
Amazon CloudWatch, CloudWatch Logs, CloudTrail + Insights, Reporting & Third Parties (ID: Sec.Det.6) |
These controls help you to monitor, detect, visualize, receive notifications, and respond to changes in your AWS resources. |
(ID: Sec.Det.3) |
This control gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts. |
(ID: Sec.Det.4) |
AWS Security Hub APN Partner products are a complement to Amazon GuardDuty. |
Honeypot and Honeynet Environments (ID: Sec.IR.10) |
These controls help to degrade, detect, and contain attacks. |
(ID: Sec.Det.11) |
Amazon Detective makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities. Amazon Detective automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to easily conduct faster and more efficient security investigations. |
(ID: Sec.Inf.30) |
This control detects reconnaissance activity using signature-based detection. |
Control Objective – Deny
The objective of the Deny control in the Reconnaissance Pre-Intrusion phase is to “prevent the adversary from accessing and using critical information, systems, and services.”**
Control Names | Descriptions |
---|---|
Amazon Virtual Private Cloud (Amazon VPC) (ID: Sec.Inf.3) |
Amazon VPC can help prevent attackers from scanning network resources during reconnaissance. Amazon VPC Black Hole Routes (as an allow list or deny list of network reachable assets before Security Groups or NACLs). |
AWS Identity and Access Management + AWS Organizations (ID: Sec.IAM.3) |
In this context, attackers can’t execute <service>:Describe* API calls without Allow permissions. |
AWS Certificate Manager + Transport Layer Security (ID: Sec.DP.3) |
Protecting data in transit denies attackers the ability to capture data in transit during the Reconnaissance phase, unless they are able to impersonate a legitimate endpoint. |
Network Infrastructure Solutions in the AWS Marketplace (ID: Sec.Inf.10) |
Infrastructure solutions in the AWS Marketplace can help deny attackers access to data and infrastructure as they conduct reconnaissance. |
AWS WAF, WAF Managed Rules + Automation (ID: Sec.Inf.2) |
This control is a solution that leverages automation to quickly and easily configure AWS WAF rules that help block Scanners and Probes, Known Attacker Origins, and Bots and Scrapers solutions. |
(ID: Sec.Inf.4) |
This control establishes private connectivity to multiple Amazon VPCs. |
(ID: Sec.Inf.30) |
The control blocks network scanning during the reconnaissance phase by blocking network scans and probes utilizing signature based intrusion prevention. |
Control Objective – Disrupt
The objective of the Disrupt control in the Reconnaissance Pre-Intrusion phase is to “break or interrupt the flow of information.” **
Control Names | Descriptions |
---|---|
(ID: Sec.IR.1) |
These controls detect reconnaissance activities and modify security configurations to block traffic associated with an attack. |
(ID: Sec.Inf.30) |
The control detects reconnaissance activity, blocking network scans and probes utilizing signature based intrusion prevention. |
Control Objective – Degrade
The objective of the Degrade control in the Reconnaissance Pre-Intrusion phase is to “reduce the effectiveness or efficiency of adversary command and control (C2) or communications systems, and information collection efforts or means.”
Control Names | Descriptions |
---|---|
Honeypot and Honeynet Environments (ID: Sec.IR.10) |
These controls help to degrade, detect, and contain attacks. |
(ID: Sec.IR.11) |
When an attacker attempts to use stolen, false credentials, these controls help to detect and contain the attack, so you can recover faster. |
Control Objective – Deceive
The objective of the Deceive control in the Reconnaissance Pre-Intrusion phase is to “cause a person to believe what is not true. MILDEC [military deception] seeks to mislead adversary decision makers by manipulating their perception of reality.”**
Control Names | Descriptions |
---|---|
Honeypot and Honeynet Environments (ID: Sec.IR.10) |
These controls help to degrade, detect, and contain attacks. |
(ID: Sec.IR.11) |
When an attacker attempts to use stolen, false credentials, these controls help to detect and contain the attack, so you can recover faster. |
(ID: Sec.IR.2) |
These controls trap the endpoint to detect content scrapers and bad bots. When the endpoint is accessed, a function adds the source IP address to a block list. |
Control Objective – Contain
The objective of the Contain control in the Reconnaissance Pre-Intrusion phase is “keeping something harmful under control or within limits.” **
Control Names | Descriptions |
---|---|
Honeypot and Honeynet Environments (ID: Sec.IR.10) |
These controls help to degrade, detect, and contain attacks. |
(ID: Sec.IR.11) |
When an attacker attempts to use stolen, false credentials, these controls help to detect and contain the attack, so you can recover faster. |
Control Objective – Respond
The objective of the Respond control in the Reconnaissance Pre-Intrusion phase is to provide “capabilities that help to react quickly to an adversary’s or others’ IO attack or intrusion.” **
Control Names | Descriptions |
---|---|
AWS WAF, WAF Managed Rules + Automation (ID: Sec.Inf.2) |
Malicious sources scan and probe internet-facing web applications for vulnerabilities. They send a series of requests that generate HTTP 4xx error codes. You can use this history to help identify and block malicious source IP addresses. |
(ID: Sec.IR.1) |
These controls detect reconnaissance activities and modify security configurations to block traffic associated with an attack. |
(ID: Sec.Det.2) |
These controls are a complement to Amazon GuardDuty. |
(ID: Sec.Det.4) |
AWS Security Hub APN Partner products are a complement to Amazon GuardDuty. |
Amazon CloudWatch Events & Alarms + Amazon SNS + SIEM Solutions (ID: Sec.Det.7) |
These controls monitor, detect, visualize, receive notification about attacks, and respond to changes in your AWS resources. |