Sample rules
Rapid Secret Retrieval Attempts from AWS SecretsManager
- source: elastic
- technicques:
- T1555
Description
This rule attempts to identify rapid secret retrieval attempts from AWS SecretsManager. Adversaries may attempt to
retrieve secrets from the Secrets Manager programmatically using the GetSecretValue
or BatchGetSecretValue
API
actions.
Detection logic
event.dataset:aws.cloudtrail and event.provider:secretsmanager.amazonaws.com and
event.action: (GetSecretValue or BatchGetSecretValue) and event.outcome:success and
not user_agent.name: ("Chrome" or "Firefox" or "Safari" or "Edge" or "Brave" or "Opera")
First Time Seen AWS Secret Value Accessed in Secrets Manager
- source: elastic
- technicques:
- T1555
Description
An adversary with access to a compromised AWS service such as an EC2 instance, Lambda function, or other service may
attempt to leverage the compromised service to access secrets in AWS Secrets Manager. This rule looks for the first time
a specific user identity has programmatically retrieved a secret value from Secrets Manager using the GetSecretValue
or BatchGetSecretValue
actions. This rule assumes that AWS services such as Lambda functions and EC2 instances are
setup with IAM role’s assigned that have the necessary permissions to access the secrets in Secrets Manager. An
adversary with access to a compromised AWS service such as an EC2 instance, Lambda function, or other service would rely
on the compromised service’s IAM role to access the secrets in Secrets Manager.
Detection logic
event.dataset:aws.cloudtrail and event.provider:secretsmanager.amazonaws.com and
event.action: (GetSecretValue or BatchGetSecretValue) and event.outcome:success and
not user_agent.name: ("Chrome" or "Firefox" or "Safari" or "Edge" or "Brave" or "Opera")