AWS CreateIndex by long term access key

This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detects usage of long-term AWS access keys to execute CreateIndex operations in AWS Resource Explorer. Identifies potential unauthorized discovery activity using compromised or misused long-term credentials.

Strategy

This rule monitors AWS CloudTrail logs for CreateIndex events generated by the resource-explorer-2.amazonaws.com service, with a specific focus on long-term access keys. AWS Resource Explorer allows users to search and discover AWS resources across regions and accounts, making it valuable for both legitimate administration and malicious reconnaissance. Long-term access keys pose a higher security risk than temporary credentials because they do not expire automatically and are more likely to be compromised or misused by unauthorized actors.

Triage & Response

  • Examine if the access key {{@userIdentity.accessKeyId}} in region {{@awsRegion}} has legitimate authorization to create resource indexes.
  • Review the user identity associated with the access key and verify if index creation aligns with their normal responsibilities.
  • Check for additional Resource Explorer API calls from the same access key to understand the scope of discovery activity.
  • Investigate the source IP address and geographic location of the API calls to identify potential unauthorized access.
  • Determine if the access key shows signs of compromise by reviewing recent authentication patterns and usage locations.
  • Validate if the timing of the CreateIndex operation aligns with known maintenance windows or legitimate administrative tasks.