AWS SES email sending enabled in current AWS region
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Goal
Detect when email sending is enabled in your Amazon SES account for the current AWS region.
Strategy
Monitor CloudTrail and detect when email sending is enabled in your Amazon SES account for the current AWS region. Attackers target the AWS SES service generally for the purpose of phishing. To ensure the capbility to send email to their targets attackers will use the API calls UpdateAccountSendingEnabled
or PutAccountSendingAttributes
to enable email sending.
Triage and response
- Determine if the API call:
{{@evt.name}}
should have been made by the user: {{@userIdentity.arn}}
from this IP address: {{@network.client.ip}}
. - If the action is legitimate, consider including the user in a suppression list. See [Best practices for creating detection rules with Datadog Cloud SIEM][3] for more information.
- If the action shouldn’t have happened:
- Contact the user:
{{@userIdentity.arn}}
and see if they made the API call. - Use the Cloud SIEM - User Investigation dashboard to see if the user
{{@userIdentity.arn}}
has taken other actions. - Use the Cloud SIEM - IP Investigation dashboard to see if there’s more traffic from the IP
{{@network.client.ip}}
.
- If the results of the triage indicate that an attacker has taken the action, initiate your company’s incident response process, as well as an investigation.