A user received an anomalous number of AccessDenied errors

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when a user is assessing privileges in AWS through API bruteforcing technique.

Strategy

This rule lets you monitor CloudTrail to detect when the error message of AccessDenied is returned on an anomalous number of unique API calls.

Triage and response

  1. Determine if {{@userIdentity.arn}} should be attempting to use the identified API calls: {{@evt.name}}.
    • Use the Cloud SIEM - User Investigation dashboard to assess user activity.
  2. Contact the user to see if they intended to make these API calls.
  3. If the user did not make the API calls:
    • Rotate the credentials.
    • Investigate to see what API calls might have been made that were successful throughout the rest of the environment.
PREVIEWING: mcretzman/DOCS-9337-add-cloud-info-byoti