- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects AWS backup service enumeration activities performed across multiple regions using long-term access keys.
This rule monitors AWS CloudTrail events for backup service enumeration API calls including ListProtectedResources
, ListBackupSelections
, ListBackupPlans
, and ListBackupVaults
when performed by long-term access keys across multiple regions.
AWS Backup enumeration is a discovery technique that enables attackers to map an organization’s infrastructure, identify backed-up resources, understand backup retention policies, and discover the breadth of services in use. This approach is particularly valuable for attackers as it provides comprehensive visibility into production resources without requiring enumeration of individual AWS services, which may be more heavily monitored.
{{@userIdentity.arn}}
has legitimate business reasons to enumerate AWS backup resources across multiple regions and determine if this represents authorized administrative activity.