A user received an anomalous number of AccessDenied errors

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when a user is assessing privileges in AWS through API bruteforcing technique.

Strategy

This rule lets you monitor CloudTrail to detect when the error message of AccessDenied is returned on an anomalous number of unique API calls.

Triage and response

  1. Determine if {{@userIdentity.arn}} should be attempting to use the identified API calls: {{@evt.name}}.
    • Use the Cloud SIEM - User Investigation dashboard to assess user activity.
  2. Contact the user to see if they intended to make these API calls.
  3. If the user did not make the API calls:
    • Rotate the credentials.
    • Investigate to see what API calls might have been made that were successful throughout the rest of the environment.
PREVIEWING: rtrieu/product-analytics-ui-changes