AWS IAM User Changing Sensitive Configurations
Dash が新機能を発表!インシデントマネジメント、Continuous Profiler など多数の機能が追加されました! Dash イベントで発表された新機能!
<  Back to rules search

AWS IAM User Changing Sensitive Configurations

guardduty

Classification:

attack

Tactic:

Technique:

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Overview

Goal

Detect when an AWS IAM user is changing sensitive configurations and has no prior history of invoking these APIs.

Strategy

This rule lets you monitor these GuardDuty integration findings:

Triage & Response

  1. Determine which user triggered the signal. This can be found in the signal.
  2. Determine if the user’s credentials are compromised.
  3. If the user’s credentials are compromised:
    • Review the AWS documentation on remediating compromised AWS credentials.