New user seen executing a command in an ECS task

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when a user executes a command on an ECS container for the first time. An attacker may use this as a technique to escalate their privileges because they can run arbitrary commands on behalf of the container with the role and permissions associated with the container.

Strategy

This rule lets you monitor this CloudTrail API call to detect if a user is executing a command on an ECS container:

  • ExecuteCommand

Triage and response

  1. Investigate the command that the user ({{@userIdentity.arn}}) ran on the container, which is located in the Cloudtrail log at @requestParameters.container, if the telemetry exists.
  2. Analyze Cloudtrail logs with {{@userIdentity.arn}} that are within the same time frame as this security signal.
  3. Review any other security signals generated for this container.