AWS EC2 key pair creation attempt with known suspicious naming convention

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when a key pair is created using a long-term access key that has a suspicious naming convention.

Strategy

This rule lets you monitor CloudTrail logs for CreateKeyPair events created from a long-term access key and shows the identity that initiated the event.

Datadog’s security research team has observed key pair naming conventions that include a common noun followed by a string of alphanumeric characters. The attack pattern can indicate that the long term access key used has been compromised, {{@userIdentity.accessKeyId}}.

Triage and response

  1. Determine if the user, {{@userIdentity.arn}}, should be generating a new key pair.
  2. Investigate the the user behavior and access information:
    • Review the user agent, IP address, and other identifying information for evidence of an abnormal access.
    • Look at additional events, such as {{@@userIdentity.arn}} and {{@userIdentity.accessKeyId}} attaching a key pair to an EC2 instance during the surrounding timeframe. The related events can be searched in EC2 logs: @eventSource:ec2.amazonaws.com and @evt.name:ImportKeypair.
  3. If the behavior is abnormal for the user and your environment:
    • Rotate the credentials.
    • Investigate if the same credentials took other unauthorized actions.
    • Begin your company’s IR process and investigate.