< Back to rules searchAWS IAM user anomalous resource consumption
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Overview
Goal
Detect when an AWS IAM user is launching compute resources and has no prior history of invoking this API.
Strategy
This rule lets you monitor this GuardDuty integration finding:
Triage & Response
- Determine which user triggered the signal. This can be found in the signal.
- Determine if the user’s credentials are compromised.
- If the user’s credentials are compromised:
- Review the AWS documentation on remediating compromised AWS credentials.