New user seen executing a command in an ECS task
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detect when a user executes a command on an ECS container for the first time. An attacker may use this as a technique to escalate their privileges
because they can run arbitrary commands on behalf of the container with the role and permissions associated with the
container.
Strategy
This rule lets you monitor this CloudTrail API call to detect if a user is executing a command on an ECS container:
Triage and response
- Investigate the command that the user ({{@userIdentity.arn}}) ran on the container, which is located in the Cloudtrail log at
@requestParameters.container
, if the telemetry exists. - Analyze Cloudtrail logs with {{@userIdentity.arn}} that are within the same time frame as this security signal.
- Review any other security signals generated for this container.