- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects usage of long-term AWS access keys to execute ListResources
operations in AWS Resource Explorer. Identifies potential unauthorized resource discovery and reconnaissance activity using compromised or misused long-term credentials.
This rule monitors AWS CloudTrail logs for ListResources
events generated by the resource-explorer-2.amazonaws.com
service, with a specific focus on long-term access keys. The ListResources
API enables enumeration of AWS resources across accounts and regions, providing attackers with valuable information about the target environment’s infrastructure. Long-term access keys present elevated security risks compared to temporary credentials due to their indefinite lifespan and higher likelihood of being compromised through credential theft, insider threats, or poor key management practices.
{{@userIdentity.accessKeyId}}
in region {{@awsRegion}}
has legitimate authorization to list AWS resources.ListResources
calls to determine if the activity indicates systematic reconnaissance.CreateIndex
or GetIndex
from the same access key.