A user received an anomalous number of AccessDenied errors

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when a user is assessing privileges in AWS through API bruteforcing technique.

Strategy

This rule lets you monitor CloudTrail to detect when the error message of AccessDenied is returned on an anomalous number of unique API calls.

Triage and response

  1. Determine if {{@userIdentity.arn}} should be attempting to use the identified API calls: {{@evt.name}}.
    • Use the Cloud SIEM - User Investigation dashboard to assess user activity.
  2. Contact the user to see if they intended to make these API calls.
  3. If the user did not make the API calls:
    • Rotate the credentials.
    • Investigate to see what API calls might have been made that were successful throughout the rest of the environment.
PREVIEWING: rtrieu/product-analytics-ui-changes