Invitation sent to account to join AWS organization

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when there is an attempt to invite an AWS account to an AWS organization.

Strategy

This rule allows you to monitor CloudTrail and detect if an attacker has attempted to invite an AWS account to an AWS organization. An attacker may attempt add an attacker controlled AWS account to a compromised AWS organization to evade the existing defenses of the organization.

This operation can be called only from the organization’s management account.

Triage and response

  1. Determine if {{@userIdentity.arn}} should have made a {{@evt.name}} API call.
    • Refer to @requestParameters.target.id to retrieve the account invited. This maybe in the form of an AWS account ID or email address.
    • Attempt to confirm the action either with the identity making the change or search for a ticket associated with the change.
    • Investigate other activities performed by the identity {{@userIdentity.arn}} using the Cloud SIEM - User Investigation dashboard.
  2. If the API call does not appear to be legitimate, begin your organization’s incident response process and investigate.
PREVIEWING: dgreen15/github-error-fix