Checks/Aws/Test-CloudtrailThreatDetectionLlmJacking.ps1
|
function Test-CloudtrailThreatDetectionLlmJacking { <# .SYNOPSIS No potential LLM jacking activity detected in CloudTrail .DESCRIPTION **CloudTrail Bedrock activity** is analyzed per identity for a high diversity of LLM-related API calls (e.g., `InvokeModel`, `InvokeModelWithResponseStream`, `GetFoundationModelAvailability`). *If an identity's share of these actions exceeds a configured threshold over a recent window*, it is surfaced as potential **LLM-jacking** behavior. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: cloudtrail_threat_detection_llm_jacking [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check cloudtrail_threat_detection_llm_jacking for reference.', 'N/A', 'cloudtrail Resources') } |