Okta temporary AWS credentials granted using open source tooling

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detects when the open source CLI tool, gimme-aws-creds, is used to obtain temporary Okta user credentials to AWS.

Strategy

This rule monitors for successful application authentication event, user.authentication.sso, events when the user agent includes gimme-aws-creds.

When the activity is from a new device or suspicious origin, the severity is increased.

Triage & Response

  • Review the sign-on details for {{@usr.email}} and confirm if the user normally uses this tooling to access AWS. The field {{@target.displayName}} will include the name of the AWS application instance which was authenticated to through the tooling.
  • Check whether the geolocation and source IP {{@network.client.ip}} match expected locations, travel, or corporate VPN patterns.
  • Examine subsequent AWS actions within CloudTrail logs from the same user after obtaining credentials.
  • If the access event is unexpected or resulted in suspicious activities, initiate your incident response plan.