Contents
Go to GuardDuty Console
To conduct a review of the Findings:
UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration
.UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration
, we can easily retrieve some of the following information:
Each GuardDuty Finding will be assigned a specific severity - Low/Medium/High. These levels are defined by AWS, they are used to classify and define
Check EventBridge Event Rule
GuardDuty-Event.
.GuardDuty-Event-IAMUser-InstanceCredentialExfiltration
.You can create an EventBridge Event Rule to record events of a particular type of Finding or any type of Finding.
The following is an example to document any GuardDuty Findings events.
{
"detail-type": [
"GuardDuty Finding"
],
"source": [
"aws.guardduty"
]
}
Check the Remediation process with Lambda Function
Alice has set up the Remediation process to automatically respond to this threat through the Lambda function. We can check the programmed code to understand more about this process.
GuardDuty-Example-Remediation-InstanceCredentialExfiltration
.What Permissions does the Lambda Function need to perform the Remediation process? Is there a possible risk with the current Permissions level?
Verify the Remediation Process
To verify that Finding InstanceCredentialExfiltration
has been completely resolved, we will proceed with the following steps in turn.
Execute the following command:
aws dynamodb list-tables --profile badbob
We will get AccessDeniedException
return for the command to execute.
Conduct an evaluation of the IAM Policy that was added to the IAM Role during the Remediation process.
GuardDuty-Example-EC2-Compromised
. This is the IAM Role that we will identify through GuardDuty Finding.RevokeOldSessions
.