Checks/Aws/Test-CloudtrailThreatDetectionEnumeration.ps1
|
function Test-CloudtrailThreatDetectionEnumeration { <# .SYNOPSIS CloudTrail logs show no potential enumeration activity .DESCRIPTION **CloudTrail activity** is analyzed for AWS identities executing a broad mix of discovery APIs like `List*`, `Describe*`, and `Get*` within a recent time window. An identity exceeding a configurable ratio of these actions indicates potential enumeration behavior by that principal. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: cloudtrail_threat_detection_enumeration [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check cloudtrail_threat_detection_enumeration for reference.', 'N/A', 'cloudtrail Resources') } |