Incident Response Flashcards
What is AWS Abuse report ?
An email sent from AWS to owner of infrastructure that is though to be abused - 24 Hours to respond
Which AWS services do not require advanced permission ?
EC2, Nat Gateways and Elastic Load Balancers
RDS
Cloudfront
Aurora
API Gateways
Lambda and Lambda Edge functions
Lightsail
Elastic Beanstalk
What type of penetration testing is prohibited on AWS ?
DNS Zone Walking vis Route 53 hosted zones
DDOS
Port Flooding
Protocol Flooding
Request Flooding
What are the steps to take for a compromised EC2 Instance ?
Capture Instances Metadata
Enable Termination Protection
Isolate Instance with closed security group
Detach from ASG
Remove instance form ELB
Snapshot Volume for analysis
Tag instance as infected
What are the steps to take for a compromised S3 bucket ?
Identify Resource - via Guardduty
Identify Cause - Detective and or Cloudtrail
Secure - Bucket policy, acls, vpc endpoints etc
What are the steps to take for a compromised ECS cluster ?
Identify Resource - via Guardduty
Identify Source
Isolate using SGs that deny all inbound and outbound traffic
Evaluate for malicious activity such as malware
What are the steps to take for a compromised standalone container?
Identify Resource - via Guardduty
Isolate - SGs
Suspend all processes within container or stop container and look at EBS snapshots retained by Guardduty
Evaluate presence of malicious activity
What are the steps to take for compromised RDS instance ?
Identify instance or user with Guardduty
Restrict access with SG and NACLS
Rotate user password
Review database audit log for leaked data
Secure instance - Secrets Manager to rotate password, IAM DB Authentication to manage DB users access without passwords