- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Classification:
attack
Tactic:
Technique:
Detects when a user enumerates AWS Secrets Manager secrets across multiple regions and then retrieves secret values.
This rule monitors AWS CloudTrail events for ListSecrets
API calls spanning multiple regions and subsequent GetSecretValue
API calls by the same user identity. This behavior pattern is concerning because legitimate users typically work within specific regions and don’t require broad secret enumeration across multiple geographic locations before accessing secrets. Attackers often perform discovery to map available secrets across an organization’s AWS infrastructure before extracting valuable credentials.
{{@userIdentity.arn}}
should be performing secret enumeration activities across multiple AWS regions.ListSecrets
operations occurred to determine if cross-region access aligns with the user’s normal responsibilities.GetSecretValue
and assess their sensitivity and business criticality.