Anomalous number of assumed roles from user
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect when a user has attempted to assume an anomalous number of unique roles.
Strategy
This rule sets a baseline for user activity for the AssumeRole
API call, and enables detection of potentially anomalous activity.
An attacker may attempt this for the following reasons:
- To identify which roles the user account has access to.
- To identify what AWS services are being used internally.
- To identify third party integrations and internal software.
Triage and response
- Investigate activity for the following ARN
{{@userIdentity.arn}}
using {{@userIdentity.session_name}}
. - Review any other security signals for
{{@userIdentity.arn}}
. - If the activity is deemed malicious:
- Rotate user credentials.
- Determine what other API calls were made by the user.
- Begin your organization’s incident response process and investigate.