
Summary
This rule is designed to monitor and identify anomalous behavior around AWS Systems Manager (SSM) Parameter Store, specifically focusing on the retrieval of parameters classified as 'SecretString'. The rule sets a threshold of 10, which triggers alerts when a specified user (individual or role) accesses a high number of secrets from SSM in a short time frame, indicating potential credential theft or misuse. The detection is based on logs sourced from AWS CloudTrail, which tracks all API calls to AWS services, allowing for comprehensive monitoring of potentially malicious activities. The rule also utilizes various test cases to ascertain whether successful access to parameters meets the threshold and if any accessed parameters are encrypted. Should the access behavior pattern fit the threshold criteria, the system will flag the incident and recommend immediate investigation into the identity of the user accessing these secrets.
Categories
- AWS
- Cloud
- Infrastructure
Data Sources
- Cloud Service
- Logon Session
- Application Log
- User Account
ATT&CK Techniques
- T1555
Created: 2025-03-19