- 重要な情報
- はじめに
- 用語集
- ガイド
- エージェント
- インテグレーション
- OpenTelemetry
- 開発者
- API
- CoScreen
- アプリ内
- Service Management
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
Detect when a user is attempting to retrieve a high number of secrets while also receiving an error message of AccessDenied
, through Cloudtrail’s GetSecretValue
event.
This rule sets a baseline for user activity in the GetSecretValue
event, and enables the detection of potentially anomalous activity when a user receives an anomalous number of AccessDenied
messages while attempting to retrieve secrets.
An attacker may attempt to enumerate and access the AWS Secrets Manager to gain access to Application Programming Interface (API) keys, database credentials, Identity and Access Management (IAM) permissions, Secure Shell (SSH) keys, certificates, and more. Once these credentials are obtained, they can be used to perform lateral movement and access restricted information.
{{@userIdentity.session_name}}
to determine if the specific set of API calls are malicious.{{@userIdentity.session_name}}
.aws-cli
command update-secret
or use the AWS Console.25 October 2022 - Updated query.