Unfamiliar IAM user retrieved secret from AWS Secrets Manager
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detect when a previously unseen IAM user retrieves secrets from AWS Secrets Manager.
Strategy
This rule lets you monitor the GetSecretValue
CloudTrail API calls to detect when a secret is retrieved. It does this by inspecting the IAM users accessing secrets within your AWS account over a 7-day window. Newly detected users after this 7-day window will generate security signals.
Triage and response
- Determine whether the IAM user:
{{@userIdentity.arn}}
is expected to access the Secrets Manager and the secrets within @requestParameters.secretId
. - If the action is legitimate, consider including the user in a suppression list. See Best practices for creating detection rules with Datadog Cloud SIEM for more information.
- If the action shouldn’t have happened:
- Contact the user:
{{@userIdentity.arn}}
and see if they made the API call. - Use the Cloud SIEM - User Investigation dashboard to see if the user
{{@userIdentity.arn}}
has taken other actions. - Use the Cloud SIEM - IP Investigation dashboard to see if there’s more traffic from the IP
{{@network.client.ip}}
.
- If the results of the triage indicate that an attacker has taken the action, begin your company’s incident response process as well as an investigation.