New user seen executing a command in an ECS task

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when a user executes a command on an ECS container for the first time. An attacker may use this as a technique to escalate their privileges because they can run arbitrary commands on behalf of the container with the role and permissions associated with the container.

Strategy

This rule lets you monitor this CloudTrail API call to detect if a user is executing a command on an ECS container:

  • ExecuteCommand

Triage and response

  1. Investigate the command that the user ({{@userIdentity.arn}}) ran on the container, which is located in the Cloudtrail log at @requestParameters.container, if the telemetry exists.
  2. Analyze Cloudtrail logs with {{@userIdentity.arn}} that are within the same time frame as this security signal.
  3. Review any other security signals generated for this container.
PREVIEWING: aliciascott/DOCS-9725-Cloudcraft