Platform | Author | Last Update |
---|
aws | Nick Jones | 2024-12-02 |
An adversary may attempt to access the secrets in secrets manager, to steal certificates, credentials or other sensitive material
MITRE IDs
Required Permissions
- secretsmanager:GetSecretValue
- kms:Decrypt
Required Parameters
Name | Type | Description | Example Value |
---|
secretid | str | ID of secret to access, either ARN or friendly name | leonidas_created_secret |
Attacker Action
Detection Case
ELK query
When logs are ingested into ELK, the following Lucene query can be used to identify relevant events.
Sigma Definition