Insider Threat Detection: AWS RDS, IAM, Connect
AWS RDS stores critical business data. If an insider gains elevated IAM permissions, they can read or dump entire datasets. The attack is silent. CloudTrail logs are your first defense, but raw logs alone are noise. You need event filtering to catch abnormal queries, suspicious login locations, and sudden permission escalations in real time.
RDS Query Monitoring
Enable enhanced monitoring and configure performance insights. Watch for unusual SQL patterns—mass selects, unexplained deletes, schema changes. Pair query events with IAM authentication logs to connect the identity to the action.
IAM Role Auditing
Harden IAM policies to follow least privilege. Continuously scan for over-permissioned roles, unused access keys, and services with wide-open trust relationships. CloudTrail + GuardDuty can flag anomalous usage from IAM principals tied to sensitive RDS resources.