<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bedrock — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/bedrock/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/bedrock/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Bedrock GuardRails Deletion Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-bedrock-guardrails-deletion/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-bedrock-guardrails-deletion/</guid><description>Detection of AWS Bedrock GuardRails deletion, which are security controls to prevent harmful AI outputs, could indicate an adversary attempting to remove safety measures after credential compromise to enable malicious model outputs.</description><content:encoded><![CDATA[<p>This analytic focuses on detecting the deletion of AWS Bedrock GuardRails. AWS Bedrock is a fully managed service that offers a choice of high-performing foundation models (FMs) from leading AI companies. GuardRails within Bedrock are security controls designed to prevent harmful, biased, or inappropriate AI outputs. The deletion of these guardrails, detected through AWS CloudTrail logs, could indicate a malicious actor attempting to bypass security measures after compromising credentials. This could potentially enable harmful or malicious model outputs, leading to the generation of offensive content, extraction of sensitive information, or circumvention of prompt injection defenses. This activity matters to defenders as it highlights a potential attempt to manipulate AI model behavior for malicious purposes, requiring immediate investigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account with sufficient privileges to manage Bedrock resources, possibly through credential compromise.</li>
<li>The attacker authenticates to the AWS environment, establishing a session.</li>
<li>The attacker identifies existing AWS Bedrock GuardRails configurations using AWS APIs or the AWS Management Console.</li>
<li>The attacker uses the <code>DeleteGuardrail</code> API call via the AWS CLI, SDK, or Management Console, specifying the <code>guardrailIdentifier</code> of the targeted GuardRail.</li>
<li>AWS CloudTrail logs the <code>DeleteGuardrail</code> event, including details such as the user identity, source IP address, and GuardRail identifier.</li>
<li>The GuardRail is successfully deleted, removing the configured safety controls for the Bedrock models.</li>
<li>The attacker leverages the now-unprotected Bedrock models to generate harmful content, extract sensitive information, or bypass other security controls.</li>
<li>The attacker exfiltrates sensitive data generated from the unprotected model to an external location.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of Bedrock GuardRails could allow attackers to manipulate AI models for malicious purposes. This could lead to the generation of offensive or harmful content, extraction of sensitive information, or bypassing prompt injection defenses. Organizations utilizing AWS Bedrock may experience reputational damage, data breaches, and regulatory compliance issues. While specific victim numbers are unavailable, the impact could be significant depending on the sensitivity of the data processed by the models.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging for all AWS regions, specifically capturing Bedrock service events to ensure the <code>DeleteGuardrail</code> API calls are logged (data_source).</li>
<li>Deploy the provided Sigma rule <code>Detect AWS Bedrock GuardRails Deletion</code> to your SIEM and tune for your environment to detect unauthorized GuardRail deletions.</li>
<li>Investigate any detected <code>DeleteGuardrail</code> events to determine the legitimacy of the action and identify potential credential compromise or malicious intent (Sigma rule).</li>
<li>Implement an allowlist for expected administrators who regularly manage GuardRails configurations to reduce false positives (known_false_positives).</li>
<li>Monitor the <code>src</code> IP addresses from which <code>DeleteGuardrail</code> API calls are made to identify potentially suspicious or unauthorized access points (rule and RBA).</li>
<li>Enforce multi-factor authentication (MFA) for all AWS accounts, especially those with privileges to manage Bedrock resources, to mitigate credential compromise (overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>bedrock</category><category>cloudtrail</category><category>defense-evasion</category></item></channel></rss>