AWS EC2 security group events observed with a suspicious naming convention

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when an AWS security group has been modified by a long-term access key that has a suspicious group naming convention.

Strategy

Monitor CloudTrail and detect when an AWS security group has been created or modified with one of the following API calls:

Datadog’s security research team has observed security group naming conventions that include a common noun followed by a string of alphanumeric characters. The attack pattern can indicate that the long term access key used has been compromised, {{@userIdentity.accessKeyId}}.

Triage and response

  1. Determine who was the user who made this API call.
  2. Contact the user and confirm this was an API call that they made.
  3. If the API call was not made by the user:
    • Rotate the user credentials and investigate what other API calls were made.
    • Determine what other API calls made by that user were not actually initiated directly by that user.