AWS ListResources by long term access key

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects usage of long-term AWS access keys to execute ListResources operations in AWS Resource Explorer. Identifies potential unauthorized resource discovery and reconnaissance activity using compromised or misused long-term credentials.

Strategy

This rule monitors AWS CloudTrail logs for ListResources events generated by the resource-explorer-2.amazonaws.com service, with a specific focus on long-term access keys. The ListResources API enables enumeration of AWS resources across accounts and regions, providing attackers with valuable information about the target environment’s infrastructure. Long-term access keys present elevated security risks compared to temporary credentials due to their indefinite lifespan and higher likelihood of being compromised through credential theft, insider threats, or poor key management practices.

Triage & Response

  • Examine if the access key {{@userIdentity.accessKeyId}} in region {{@awsRegion}} has legitimate authorization to list AWS resources.
  • Review the user identity associated with the access key and verify if resource enumeration aligns with their job responsibilities.
  • Analyze the scope and frequency of ListResources calls to determine if the activity indicates systematic reconnaissance.
  • Investigate the source IP address and geographic location to identify potential unauthorized access patterns.
  • Check for correlated Resource Explorer API calls such as CreateIndex or GetIndex from the same access key.
  • Determine if the access key has been recently rotated or shows other signs of potential compromise.
  • Validate if the resource listing activity occurs during expected business hours and aligns with known operational procedures.