Account credential stolen -

0

Hi all, my credential have been stolen. I changed my account password, but i am affraid that access keys are now in other hands. I have EC2, RDS and VCP istances up and running. How i can ensure that nobody could push any unouthorized code? Should i change all the keys? If yes how i can i do it properly?

Also how i cna be sure that no other instances have been initiated?

Any other aspect to verify to restore the full security of the web?

Thank you

Regards

2回答
5
承認された回答

Greetings, I am sorry to hear that your credentials have been stored. Since AWS credentials have been compromised, follow these condensed steps to secure your account:

Rotate Access Keys: Immediately change access keys for all IAM users. Do this via the IAM console by creating new keys and deactivating the old ones.

Audit AWS Environment: Use AWS CloudTrail logs to check for unauthorized activities. Verify all EC2, RDS, and VPC instances for any unrecognized resources and terminate if necessary.

Enable Multi-Factor Authentication (MFA): Set up MFA for your AWS account and for IAM users to add an extra layer of security.

Review and Tighten IAM Policies: Ensure IAM policies adhere to the principle of least privilege.

Monitor with CloudWatch: Set up Amazon CloudWatch alarms for unusual activity monitoring.

Contact AWS Support: If you suspect further compromise, contact AWS Support for assistance.

Review External Dependencies: Check external services linked to your AWS account for potential compromises and rotate shared keys or tokens.

Educate Your Team: Make sure your team is aware of the security incident and understands the importance of following security best practices.

Taking these actions quickly can help mitigate risks and secure your AWS environment against unauthorized access.

Please let me know if you have any questions.

AWS
エキスパート
ZJon
回答済み 2ヶ月前
1

Some tasks to perform. What access does your User account have? They could only make changes within your permission boundary

  • Re-issue all keys for all users.
  • Reset all users password credentials
  • Review ALL roles and their Trusts because a role could trust an account from an external account
  • Review all newly created users, roles
  • Check for newly created IDPs
  • Check for any org creation/sub accounts
  • Review all newly created resources
  • Review all newly created security groups
profile picture
エキスパート
回答済み 3ヶ月前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ