AWS CreateIndex by long term access key

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects usage of long-term AWS access keys to execute CreateIndex operations in AWS Resource Explorer. Identifies potential unauthorized discovery activity using compromised or misused long-term credentials.

Strategy

This rule monitors AWS CloudTrail logs for CreateIndex events generated by the resource-explorer-2.amazonaws.com service, with a specific focus on long-term access keys. AWS Resource Explorer allows users to search and discover AWS resources across regions and accounts, making it valuable for both legitimate administration and malicious reconnaissance. Long-term access keys pose a higher security risk than temporary credentials because they do not expire automatically and are more likely to be compromised or misused by unauthorized actors.

Triage & Response

  • Examine if the access key {{@userIdentity.accessKeyId}} in region {{@awsRegion}} has legitimate authorization to create resource indexes.
  • Review the user identity associated with the access key and verify if index creation aligns with their normal responsibilities.
  • Check for additional Resource Explorer API calls from the same access key to understand the scope of discovery activity.
  • Investigate the source IP address and geographic location of the API calls to identify potential unauthorized access.
  • Determine if the access key shows signs of compromise by reviewing recent authentication patterns and usage locations.
  • Validate if the timing of the CreateIndex operation aligns with known maintenance windows or legitimate administrative tasks.