- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects first-time execution of ListResources
operations by previously unseen AWS principal identities. Identifies potential unauthorized resource discovery activity from new or compromised accounts.
This rule analyzes AWS CloudTrail logs for ListResources
events from the resource-explorer-2.amazonaws.com
service, using a new value detection on @userIdentity.principalId
. It establishes a baseline of principals who have previously executed ListResources
operations and triggers an alert when a principal identity is observed performing this action for the first time. Since the ListResources
API in AWS Resource Explorer enables broad visibility into resources across accounts and regions, its use by a new principal could signal account compromise, privilege escalation, or unauthorized access, in addition to legitimate administrative activity.
{{@userIdentity.principalId}}
to determine if it represents a legitimate user, role, or service account.ListResources
calls to detect potential unauthorized access.ListResources
execution correlates with known onboarding activities or role assignments.