Possible AWS backup resource enumeration by long term access key

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects AWS backup service enumeration activities performed across multiple regions using long-term access keys.

Strategy

This rule monitors AWS CloudTrail events for backup service enumeration API calls including ListProtectedResources, ListBackupSelections, ListBackupPlans, and ListBackupVaults when performed by long-term access keys across multiple regions.

AWS Backup enumeration is a discovery technique that enables attackers to map an organization’s infrastructure, identify backed-up resources, understand backup retention policies, and discover the breadth of services in use. This approach is particularly valuable for attackers as it provides comprehensive visibility into production resources without requiring enumeration of individual AWS services, which may be more heavily monitored.

Triage & Response

  • Verify if {{@userIdentity.arn}} has legitimate business reasons to enumerate AWS backup resources across multiple regions and determine if this represents authorized administrative activity.
  • Examine the timeline of backup enumeration calls to identify if the activity follows suspicious patterns such as rapid successive calls or unusual timing outside business hours.
  • Review other API calls made by the same access key to identify additional reconnaissance activities or attempts to access discovered resources.
  • Check if the enumerated backup resources have been accessed, modified, or if any backup policies have been changed following the enumeration activity.
  • Analyze the source IP addresses and user agent strings associated with these API calls to determine if they originate from expected administrative locations or tools.