AWS Retrieve a High Number of Secrets Manager secrets
Platform: AWS
MITRE ATT&CK Tactics
- Credential Access
Description
Lists the secrets stored in Secrets Manager and retrieves (20) secret values
Attacker Actions:
- First, lists the secrets stored in Secrets Manager in the current region.
- Secondly, retrieves the values of (20) secrets stored in Secrets Manager
- Resulting event names:
ListSecrets
GetSecretValue
- Assigned IAM Permission:
secretsmanager:ListSecrets
secretsmanager:GetSecretValue
Workflow Inputs:
Specify which user this attack should run as.
Clean Up:
None
Execution Instructions
- See User Guide for Execution Instructions via the Google Cloud Console
- Programmatically execute this workflow with the following cli command:
Detection Artifacts
Identify principals retrieving a high number of secrets, through CloudTrail's GetSecretValue event.