Cloudtrail SecretsManager secret retrieved from AWS CloudShell environment

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when an AWS secret is retrieved from an AWS CloudShell environment.

Strategy

Monitor CloudTrail and detect when an AWS secret is retrieved from an AWS CloudShell environment. The threat group LUCR-3 uses AWS CloudShell in the AWS management console to carry out activities that require direct interaction with the AWS API, such as the retrieval of secrets.

Triage and response

  1. Determine if {{@userIdentity.arn}} should have carried out this operation.
  2. If the API calls were not made by the user:
  • Rotate user credentials.
  • Rotate the secrets retrieved by the identity, if feasible.
  • Determine what other API calls were made by the user.
  • Begin your organization’s incident response process and investigate.
PREVIEWING: brett.blue/embedded-collector-release