cloudwatch or cloudtrail for lambda passrole attack

0

We have one aws user has passrole, lambda invoke and create inline policy, we suspect this user use lambda script to passrole and attach awsadminaccess policy to his account, how can we identify this? through cloudwatch or cloudtrail? if through cloudtrail, how would we know the lamda script he invoke is malicious and how to track role change for this IAM account giving date range? thanks

質問済み 2年前258ビュー
2回答
0

For sensitive questions, I'd reach out to AWS Support for help as well.

For AWS Management API calls including IAM Changes such as:

In Cloudtrail, you can filter by dates and search by Events as well. For checking the Lambda, you can check Invocation of the Lambda (Lambda being run as well).

There are some AWS Services that offer checks like that such as AWS Config: https://docs.aws.amazon.com/config/latest/developerguide/iam-policy-no-statements-with-admin-access.html, but you may want to evaluate the cost of those services as well.

For information about to do with suspected compromise, read here: https://aws.amazon.com/premiumsupport/knowledge-center/potential-account-compromise/.

jsonc
回答済み 2年前
0

Hi, I checked the cloudtrail, I define the time range, then i search event name: attachrolepolicy.

i want to further restricted by user or other criteria, how to do? it only allow me to search one criterial for example Event name

回答済み 2年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ