
Summary
The AWS Credential Access GetPasswordData analytic rule detects a potentially malicious activity by identifying more than 10 calls to the GetPasswordData API within a 5-minute period, utilizing AWS CloudTrail logs. This behavior may signify an attempt by an unauthorized user to access encrypted administrator passwords for Windows instances, presenting a substantial risk as attackers could gain unauthorized access to administrative privileges, compromising the entire AWS environment. The rule counts distinct instance IDs accessed to enhance detection accuracy and is crucial for monitoring security within AWS accounts, particularly for environments that leverage Windows EC2 instances.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
ATT&CK Techniques
- T1552
- T1586
- T1586.003
- T1110
- T1110.001
Created: 2024-11-14