Skip to content

Instantly share code, notes, and snippets.

@z0ph
Created October 21, 2024 18:00
Show Gist options
  • Save z0ph/799b2be82945874f810fd1dd4360c8bb to your computer and use it in GitHub Desktop.
Save z0ph/799b2be82945874f810fd1dd4360c8bb to your computer and use it in GitHub Desktop.
{
"featureDetails": [
{
"featureDescription": "Amazon GuardDuty enhances the UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.InsideAWS finding to detect the use of instance credentials from VPC Endpoints (AWS PrivateLink) in accounts not associated with the EC2 instance role. This new GuardDuty capability detects potential EC2 instance credential misuse and provides context of the remote AWS account using the exfiltrating session credentials. For AWS Service Endpoints supported by this new detection, please see AWS CloudTrail - Logging network activity events: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html",
"featureLink": "https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-iam.html#unauthorizedaccess-iam-instancecredentialexfiltrationinsideaws"
}
],
"type": "NEW_FINDINGS",
"version": "1"
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment