Platform | Author | Last Update |
---|
aws | Nick Jones | 2024-12-02 |
An adversary may attempt to enumerate the secrets in secrets manager, in order to find secrets to access.
MITRE IDs
Required Permissions
- secretsmanager:ListSecrets
Required Parameters
None
Attacker Action
Detection Case
ELK query
When logs are ingested into ELK, the following Lucene query can be used to identify relevant events.
Sigma Definition