Skip to content

Latest commit

 

History

History
183 lines (156 loc) · 10.6 KB

Responding_to_SES_Events.md

File metadata and controls

183 lines (156 loc) · 10.6 KB

Incident Response Playbook: Responding to Simple Email Service Events

Points of Contact

Author: Author's Name
Approver: Approver Name
Last Date Approved:

Objectives

Throughout the execution of the playbook, focus on the desired outcomes, taking notes for enhancement of incident response capabilities.

Determine:

  • Vulnerabilities exploited
  • Exploits and tools observed
  • Actor's intent
  • Actor's attribution
  • Damage inflicted to the environment and business

Recover:

  • Return to original and hardened configuration

Enhance CAF Security Perspective components:

AWS Cloud Adoption Framework Security Perspective

  • Directive
  • Detective
  • Responsive
  • Preventative

Image


Response Steps

  1. [PREPARATION] Use AWS GuardDuty detections for IAM
  2. [PREPARATION] Identify, document, and test escalation Procedures
  3. [DETECTION AND ANALYSIS] Perform detection and analyze CloudTrail for unrecognized API events
  4. [DETECTION AND ANALYSIS] Perform detection and analyze CloudWatch for unrecognized events
  5. [CONTAINMENT & ERADICATION] Delete or rotate IAM User Keys
  6. [CONTAINMENT & ERADICATION] Delete or rotate unrecognized resources
  7. [CONTAINMENT & ERADICATION] Rotate SMTP Credentials
  8. [RECOVERY] Execute recovery procedures as appropriate

***The response steps follow the Incident Response Life Cycle from NIST Special Publication 800-61r2 Computer Security Incident Handling Guide

Incident Classification & Handling

  • Tactics, techniques, and procedures: Tool: AWS Management Console
  • Category: Log Analysis
  • Resource: SES
  • Indicators: Cyber Threat Intelligence, Third Party Notice
  • Log Sources: CloudTrail
  • Teams: Security Operations Center (SOC), Forensic Investigators, Cloud Engineering

Incident Handling Process

The incident response process has the following stages:

  • Preparation
  • Detection & Analysis
  • Containment & Eradication
  • Recovery
  • Post-Incident Activity

Executive Summary

This playbook outlines the process for responses to attacks against AWS Simple Email Service (SES). In combination with this guide, please review the Amazon SES Sending review process FAQs for answers to enforcement actions and responses to adverse SES usage.

For additional information, please review the AWS Security Incident Response Guide

Preparation - General

  • Assess your security posture to identify and remediate security gaps
    • AWS developed a new open source Self-Service Security Assessment tool that provides customers with a point-in-time assessment to gain valuable insights into the security posture of their AWS account.
  • Maintain a complete asset inventory of all resources including servers, networking devices, network/file shares and developer machines
  • Consider implementing AWS GuardDuty to continuously monitor for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon SES
  • Implement CIS AWS Foundations including expiration of accounts and mandatory credential rotations
  • Enforce multi-factor authentication (MFA)
  • Enforce password complexity requirements and establish expiration periods
  • Run an IAM Credential Report to list all users in your account and the status of their various credentials, including passwords, access keys, and MFA devices
  • Use AWS IAM Access Analyzer to identify the resources in your organization and accounts, such as IAM roles that are shared with an external entity. This lets you identify unintended access to your resources and data, which is a security risk

Preparation - SES Specific

Potential AWS GuardDuty Detections

The following findings are specific to IAM entities and access keys and always have a Resource Type of AccessKey. The severity and details of the findings differ based on the finding type. For more information on each finding type please reference the GuardDuty IAM finding types webpage.

  • CredentialAccess:IAMUser/AnomalousBehavior
  • DefenseEvasion:IAMUser/AnomalousBehavior
  • Discovery:IAMUser/AnomalousBehavior
  • Exfiltration:IAMUser/AnomalousBehavior
  • Impact:IAMUser/AnomalousBehavior
  • InitialAccess:IAMUser/AnomalousBehavior
  • PenTest:IAMUser/KaliLinux
  • PenTest:IAMUser/ParrotLinux
  • PenTest:IAMUser/PentooLinux
  • Persistence:IAMUser/AnomalousBehavior
  • Policy:IAMUser/RootCredentialUsage
  • PrivilegeEscalation:IAMUser/AnomalousBehavior
  • Recon:IAMUser/MaliciousIPCaller
  • Recon:IAMUser/MaliciousIPCaller.Custom
  • Recon:IAMUser/TorIPCaller
  • Stealth:IAMUser/CloudTrailLoggingDisabled
  • Stealth:IAMUser/PasswordPolicyChange
  • UnauthorizedAccess:IAMUser/ConsoleLoginSuccess.B
  • UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.OutsideAWS
  • UnauthorizedAccess:IAMUser/MaliciousIPCaller
  • UnauthorizedAccess:IAMUser/MaliciousIPCaller.Custom
  • UnauthorizedAccess:IAMUser/TorIPCaller

Escalation Procedures

  • I need a business decision on when forensics should be conducted
  • Who is monitoring the logs/alerts, receiving them and acting upon each?
  • Who gets notified when an alert is discovered?
  • When do public relations and legal get involved in the process?
  • When would you reach out to AWS Support for help?

Detection and Analysis

CloudTrail

Amazon SES is integrated with AWS CloudTrail, a service that provides a record of actions taken by a user, role, or an AWS service in Amazon SES. CloudTrail captures API calls for Amazon SES as events. The calls captured include calls from the Amazon SES console and code calls to the Amazon SES API operations.

Following are specific CloudTrail eventName events to look for changes in your account related to SES:

  • DeleteIdentity
  • DeleteIdentityPolicy
  • DeleteReceiptFilter
  • DeleteReceiptRule
  • DeleteReceiptRuleSet
  • DeleteVerifiedEmailAddress
  • GetSendQuota
  • PutIdentityPolicy
  • UpdateReceiptRule
  • VerifyDomainDkim
  • VerifyDomainIdentity
  • VerifyEmailAddress
  • VerifyEmailIdentity

Viewing events with CloudTrail Event history

Other Detective Controls

Containment and Eradication

Recovery

Lessons Learned

This is a place to add items specific to your company that do not necessarilly need "fixing", but are important to know when executing this playbook in tandem with operational and business requirements.

Addressed Backlog Items

Current Backlog Items