Created
October 21, 2024 18:00
-
-
Save z0ph/799b2be82945874f810fd1dd4360c8bb to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"featureDetails": [ | |
{ | |
"featureDescription": "Amazon GuardDuty enhances the UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.InsideAWS finding to detect the use of instance credentials from VPC Endpoints (AWS PrivateLink) in accounts not associated with the EC2 instance role. This new GuardDuty capability detects potential EC2 instance credential misuse and provides context of the remote AWS account using the exfiltrating session credentials. For AWS Service Endpoints supported by this new detection, please see AWS CloudTrail - Logging network activity events: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html", | |
"featureLink": "https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-iam.html#unauthorizedaccess-iam-instancecredentialexfiltrationinsideaws" | |
} | |
], | |
"type": "NEW_FINDINGS", | |
"version": "1" | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment