Unfamiliar IAM user retrieved a decrypted AWS Systems Manager parameter

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when an IAM user retrieves a decrypted AWS Systems Manager parameter.

Strategy

This rule lets you monitor CloudTrail and detect when an IAM user retrieves a decrypted parameter from AWS Systems Manager using the GetParameters API calls

This rule uses the New Value detection method. Datadog learns the historical behavior of the identities within your environment, then creates a signal when unfamiliar values appear.

Triage & response

  1. Determine if {{@userIdentity.arn}} is expected to perform the {{@evt.name}} API call on the parameter {{@resource.ARN}}.
  2. If the action is legitimate, consider including the user in a suppression list. See Best practices for creating detection rules with Datadog Cloud SIEM for more information.
  3. Otherwise, if the results of the triage indicate that an attacker has taken the action, begin your company’s incident response process and an investigation.
PREVIEWING: aliciascott/DOCS-9725-Cloudcraft