AWS IAM AmazonSESFullAccess policy was applied to a role

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when the AmazonSESFullAccess policy is attached to an AWS IAM role.

Strategy

This rule allows you to monitor CloudTrail and detect if an attacker has attached the AWS managed policy AmazonSESFullAccess to an AWS IAM role using the AttachRolePolicy API call. An attacker with an objective of leveraging the AWS Simple Email Service (SES) may only attach a policy relating to SES to avoid detections relating to the AWS managed policy [AdministratorAccess].

Triage and response

  1. Determine if {{@userIdentity.session_name}} should have made a {{@evt.name}} API call.
  2. If the API call was not made by the user:
  • Rotate user credentials.
  • Determine what other API calls were made by the user.
  • Remove the AmazonSESFullAccess policy from the {{@requestParameters.roleName}} role using the aws-cli command detach-role-policy.
  1. If the API call was made legitimately by the user:
  • Determine if the role {{@requestParameters.roleName}} requires the AmazonSESFullAccess policy to perform the intended function.
  • Advise the user to find the least privileged policy that allows the role to operate as intended.