
Summary
The detection rule 'AWS EC2 Many Password Read Attempts' identifies excessive unauthorized or attempted access to AWS EC2 instance passwords. This rule triggers if there are more than three attempts to retrieve password data within a 60-minute period, which indicates potentially malicious actions or misconfigurations. The detection utilizes AWS CloudTrail logs to track these API call attempts, specifically the 'ec2:GetPasswordData' call, which is typically used to retrieve the Windows admin password for EC2 instances. Since legitimate access to passwords should be infrequent, a threshold of three attempts raises suspicions, warranting investigation into the requesting user and the targeted EC2 instances. The rule maps its logic to the MITRE ATT&CK framework under the credential access technique TA0006:T1555, underlining its relevance in securing environments by highlighting potential attacker behaviors related to credential extraction.
Categories
- Cloud
- AWS
- Endpoint
Data Sources
- Cloud Service
- Application Log
- Network Traffic
ATT&CK Techniques
- T1555
Created: 2025-01-28