MITRE ATT&CK in Amazon Web Services (AWS) :: A Defender's Cheat Sheet
MITRE ATT&CK in Amazon Web Services (AWS) :: A Defender's Cheat Sheet
For example, if you see suspected credential access, you can investigate to check how
that principal authenticated to AWS, if they’ve assumed any other roles and if there are
any other suspicious API calls that could represent if this were an attacker. Some other
tactics that an attacker could have executed prior to credential access are discovery,
persistence and privilege escalation.
ModifySnapshotAttribute
AWS AMI PutGroupPolicy
ModifyImageAttribute AWS Lambda AWS IAM Group
CreateGroup
ConsoleLogin
Head*
GetFederationToken
Get*
AWS Services Console/CLI GetSessionToken
AWS
List*
Discovery Initial StartSession
Describe*
access GetAuthorizationToken
CloudTrail
CreateInstance
CreateUser
CreateKeyPair
CreateFunction CreateRole
CreateImage
UpdateFunctionCode UpdateAssumeRolePolicy
* represents a wildcard that can be CreateRepository
CreateAccessKey
PutImage
substituted for several AWS APIs www.expel.io
A closer look at
tactics, techniques
and API calls To help you get a better sense
of how we think about our
investigations in AWS, let’s
take a closer look at the tactics,
techniques and associated API
calls attackers might use.
Initial access
Initial
access
Why attackers do it: To gain access to your
AWS environment.
www.expel.io
Persistence
MITRE ATT&CK tactic:
Persistence
CreateUser
CreateRole
Why attackers do it: To maintain access to your AWS IAM
UpdateAssumeRolePolicy
AWS environment across any interruptions. CreateAccessKey
CreateFunction
UpdateFunctionConfiguration
Why attackers do it: To gain higher-level UpdateFunctionCode
Credential access
Credential
access
Why attackers do it: To access and acquire
credentials in the AWS environment. Stolen credentials
may allow attackers to gain access to different AWS
resources, settings and permissions.
AWS Secrets GetSecretValue
Manager
How attackers usually execute it: Amazon
EC2 and AWS Secrets manager.
Discovery
Discovery
Why attackers do it: To discover and enumerate
sensitive information about the AWS environment.
www.expel.io
* represents a wildcard that can be substituted for several AWS APIs
MITRE ATT&CK tactic:
Collection
Collection
Why attackers do it: To collect sensitive data
from AWS resources and services. Attackers typically
exfiltrate collected data to their own infrastructure.
Exfiltration ModifySnapshotAttribute
AWS
AWSAMI
IAM
ModifyImageAttribute
Our SOC-as-a-service capability offers 24x7 security monitoring and response for cloud, hybrid and on-premises environments. We use the security signals
our customers already own so organizations can get more value from their existing security investments. We connect to customer tech remotely through
APIs, not agents, so our SOC can start monitoring a customer’s environment in a matter of hours, letting their internal teams get back to focusing on the
most strategic security priorities that are unique to their business. Learn more at www.expel.io.