
Summary
The detection rule is designed to identify access to AWS Secrets Manager, specifically monitoring the API calls for `GetSecretValue` and `BatchGetSecretValue`. These functions are used to retrieve the contents of secrets—either the `SecretString` or `SecretBinary`—from AWS Secrets Manager, enabling users to handle sensitive data securely. The rule leverages AWS CloudTrail logs, which track user activity within AWS services, to monitor for these API calls. It utilizes Splunk's querying capabilities to filter events related to these secret retrieval operations. If either function is invoked, the query extracts relevant contextual information such as timestamps, source IP addresses, user details, and more, helping to ascertain the nature of the request and its legitimacy. This rule also accounts for the potential unauthorized access to sensitive information by assessing requests for multiple secrets at once.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1082
Created: 2024-04-12