Through this exercise, we have taken the steps involved in generating and analyzing the Findings, thereby performing the corresponding Remediation process to solve the problem immediately.
Finding | Scenario |
---|---|
UnauthorizedAccess:EC2/MaliciousIPCaller.Custom | Compromised EC2 Instance |
Recon:IAMUser/MaliciousIPCaller.Custom | Compromised IAM credentials |
UnauthorizedAccess:IAMUser/MaliciousIPCaller.Custom | Compromised IAM credentials |
UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration | IAM Role credential exfiltration |