Creation of new AWS Bedrock long term access key with no expiration date

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when a long term API key for AWS Bedrock is created without an expiration date

Strategy

This rule monitors CloudTrail and detects when any @eventName has a value of CreateServiceSpecificCredential, @responseElements.serviceSpecificCredential.serviceName:bedrock.amazonaws.com has a value of bedrock.amazonaws.com, and the expiration date begins with 21 (indicating an expiration date 100 years in the future). Long term access keys are vulnerable to compromise by infostealers and credential leaks, and a lack of an expiration date significantly increases the change of compromise.

Triage & Response

  1. Determine if the user {{@userIdentity.arn}} intended to generate a Bedrock token with no expiration date.
  2. If {{@userIdentity.arn}} didn’t intend to generate the Bedrock token with no expiration date or the token is not compliant with your organization’s policies:
    • Delete the token {{@responseElements.serviceSpecificCredential.serviceSpecificCredentialId}} by calling DeleteServiceSpecificCredential or deactivate it using UpdateServiceSpecificCredential
  3. Investigate calls made by the key’s associated IAM User {{@responseElements.serviceSpecificCredential.userName}} for signs of malicious activity.
  4. Begin your organization’s incident response process and investigate.
  5. Consider creating an IAM policy condition with the condition iam:ServiceSpecificCredentialAgeDays to require expiration dates.
  6. Consider the usage of temporary credentials over long-lived credentials associated with IAM users.