🥣 Secret SauceEach week, we'll showcase your top AWS insights, focusing on AWS Security tricks and tips. Got a cool command-line hack, a clever console maneuver, or an awesome open-source tool? Send us your best tips for a shot at being featured in our upcoming issues. Christophe from
Cybr.com, a platform to learn AWS Security.
I spent more time than I care to admit last week figuring this out so I wanted to share and save you a few hours in case you ever need it.
Edition #147 shared how CloudShell’s GetFileDownloadUrls was actively being used by threat actors to exfil data from Secrets Manager. I wanted to contribute monitoring & alerting for this event in the
ASSK, and I thought it would be as easy as creating an event pattern in EventBridge for cloudshell.amazonaws.com with the eventName:
GetFileDownloadUrls. It didn’t work at all.
Turns out the event is a read-only event, which is a newly supported option in EventBridge as of
November 2023, and it requires that you enable it with a State:
"ENABLED_WITH_ALL_CLOUDTRAIL_MANAGEMENT_EVENTS”.
This isn’t super clear in the documentation right now, so if you are trying to process an event with EventBridge that’s read-only and your event seems to just be disappearing into the void, that’s probably why.
The end result and the way I ended up implementing it for the ASSK: