• IAM Abuse
    • Storage Abuse
    • Compute Abuse
  • science Research
    • CloudTrail Rules
    • Splunk Rules
    • Sigma Rules
    • Technique → Detection
    • IAM Design
    • Monitoring Strategy
    • Adversary Platform
    • Detection Generator
    • GitHub
    • Twitter / X
    • RSS
  • to navigate
  • to select
  • to close
    • Home
    • Attack Detection Map
    On this page
    • Attack Detection Map
      • Overview
      • Purpose
      • AWS Attack → Detection Matrix
      • Related Sections
    • Attack Detection Map
      • Overview
      • Purpose
      • AWS Attack → Detection Matrix
      • Related Sections
    map

    Attack Detection Map

    AWS attack techniques mapped to detection rules.

    link

    Technique → Detection

    How attack techniques map to detection signals.


    © 2026 Detecting.Cloud. AWS Security Detection Research.