- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects coordinated AWS Resource Explorer reconnaissance activity where CreateIndex
operations are followed by ListResources
operations using long-term access keys. Identifies systematic resource discovery patterns indicative of attack preparation or unauthorized environment mapping.
This rule correlates two signals based on @userIdentity.accessKeyId
and @awsRegion
within a 24-hour window. It monitors for the sequence where a principal first creates a resource index using long-term access keys and subsequently performs resource listing operations using the same long-term credentials. This behavior pattern represents a systematic approach to AWS environment reconnaissance, where an attacker first establishes the capability to search resources by creating an index, then immediately leverages that index to enumerate available resources. The combination of both activities using long-term access keys suggests deliberate and potentially unauthorized infrastructure discovery efforts that exceed typical administrative workflows.
{{@userIdentity.accessKeyId}}
and principal identity involved in both the CreateIndex
and ListResources
operations in region {{@awsRegion}}
.ListResources
queries to understand what resources the actor was targeting.