{"id":16422,"date":"2019-05-24T12:00:17","date_gmt":"2019-05-24T03:00:17","guid":{"rendered":"http:\/\/www.skyarch.net\/blog\/?p=16422"},"modified":"2019-05-23T13:17:52","modified_gmt":"2019-05-23T04:17:52","slug":"%e5%a2%97%e5%8a%a0%e3%81%99%e3%82%8b%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e3%81%ae%e8%84%85%e5%a8%81%e3%81%ab%e5%af%be%e5%87%a6%e3%81%99%e3%82%8b%e3%81%ab%e3%81%af%ef%bc%9f-amazon-gua","status":"publish","type":"post","link":"https:\/\/www.skyarch.net\/blog\/%e5%a2%97%e5%8a%a0%e3%81%99%e3%82%8b%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e3%81%ae%e8%84%85%e5%a8%81%e3%81%ab%e5%af%be%e5%87%a6%e3%81%99%e3%82%8b%e3%81%ab%e3%81%af%ef%bc%9f-amazon-gua\/","title":{"rendered":"\u5897\u52a0\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u8105\u5a01\u306b\u5bfe\u51e6\u3059\u308b\u306b\u306f\uff1f Amazon GuardDuty \u306e\u3054\u7d39\u4ecb"},"content":{"rendered":"<h2 id=\"\u7d4c\u55b6\u8ab2\u984c\u3068\u3057\u3066\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\">\u7d4c\u55b6\u8ab2\u984c\u3068\u3057\u3066\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/h2>\n<p>\u8fd1\u6642 IT \u3092\u6d3b\u7528\u3057\u305f\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\uff08DX\uff09\u304c\u7d4c\u55b6\u9769\u65b0\u306e\u305f\u3081\u306b\u6b20\u304b\u305b\u306a\u3044\u8981\u7d20\u3068\u3057\u3066\u8a8d\u8b58\u3055\u308c\u308b\u3088\u3046\u306b\u306a\u3063\u3066\u304d\u307e\u3057\u305f\u3002<\/p>\n<p>\u4e00\u65b9\u3067\u81ea\u52d5\u8eca\u3084\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u306b\u4ee3\u8868\u3055\u308c\u308b\u3001\u3059\u3079\u3066\u306e\u30e2\u30ce\u304c\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3055\u308c\u308b Internet of Things (IoT) \u3068\u547c\u3070\u308c\u308b\u72b6\u6cc1\u3067\u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u901a\u3058\u305f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8105\u5a01\u306b\u3055\u3089\u3055\u308c\u308b\u3053\u3068\u306b\u306a\u308a\u307e\u3059\u3002<\/p>\n<p>\u305d\u306e\u305f\u3081\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3082 DX \u306e\u9032\u5c55\u306b\u4f34\u3063\u3066\u55ab\u7dca\u306e\u8ab2\u984c\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u7d4c\u6e08\u7523\u696d\u7701\u3067\u3082\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7d4c\u55b6\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u300d<a id=\"fnref1\" class=\"footnoteRef\" href=\"#fn1\"><sup>1<\/sup><\/a> \u3092\u516c\u958b\u3057\u7d4c\u55b6\u8005\u3068\u3057\u3066\u53d6\u308a\u7d44\u3080\u3079\u304d\u30b5\u30a4\u30d0\u30fc\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30ea\u30b9\u30af\u3068\u8ab2\u984c\u306b\u3064\u3044\u3066\u6ce8\u610f\u559a\u8d77\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<h2 id=\"\u30b5\u30a4\u30d0\u30fc\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u7d4c\u55b6\u4e0a\u306e\u30ea\u30b9\u30af\">\u30b5\u30a4\u30d0\u30fc\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u7d4c\u55b6\u4e0a\u306e\u30ea\u30b9\u30af<\/h2>\n<p>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u306e\u5e73\u5747\u5bfe\u5fdc\u30b3\u30b9\u30c8\u306f\u7d041\u51047,600\u4e07\u5186\u3068\u3044\u3046\u63a8\u8a08\u3082\u3042\u308a\u307e\u3059\u3002<a id=\"fnref2\" class=\"footnoteRef\" href=\"#fn2\"><sup>2<\/sup><\/a> \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u306e\u8cbb\u7528\u306f\u5bfe\u5916\u7684\u306a\u30b3\u30b9\u30c8\u3068\u5bfe\u5185\u7684\u30b3\u30b9\u30c8\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>\u5bfe\u5916\u7684\u306a\u30b3\u30b9\u30c8\u3068\u3057\u3066\u306f\u4ee5\u4e0b\u306e\u8cbb\u7528\u304c\u767a\u751f\u304c\u8003\u3048\u3089\u308c\u307e\u3059\u3002<\/p>\n<blockquote>\n<ul>\n<li>\u55b6\u696d\u7d99\u7d9a\u8cbb\u7528<\/li>\n<li>\u793e\u544a\u8cbb\u7528<\/li>\n<li>\u30b3\u30fc\u30eb\u30bb\u30f3\u30bf\u30fc\u958b\u8a2d\u30fb\u5897\u8a2d\u30fb\u5897\u54e1\u8cbb\u7528<\/li>\n<li>\u8b1d\u7f6a\u6587\u4f5c\u6210\u30fb\u9001\u4ed8\u8cbb\u7528<\/li>\n<li>\u304a\u8a6b\u3073\u54c1\u30fb\u91d1\u5238\u8abf\u9054\u30fb\u9001\u4ed8\u8cbb\u7528<\/li>\n<li>\u8a34\u8a1f\u8cbb\u7528<\/li>\n<li>\u640d\u5bb3\u8ce0\u511f\u7981<\/li>\n<\/ul>\n<\/blockquote>\n<p>\u5bfe\u5185\u7684\u30b3\u30b9\u30c8\u3068\u3057\u3066\u306f\u4ee5\u4e0b\u304c\u8003\u3048\u3089\u308c\u307e\u3059\u3002<\/p>\n<blockquote>\n<ul>\n<li>\u5916\u90e8\u8abf\u67fb\u6a5f\u95a2\u3078\u306e\u8abf\u67fb\u4f9d\u983c\u65e5<\/li>\n<li>\u30b7\u30b9\u30c6\u30e0\u5fa9\u65e7\u8cbb\u7528<\/li>\n<li>\u30c7\u30fc\u30bf\u5fa9\u65e7\u8cbb\u7528<\/li>\n<li>\u518d\u767a\u9632\u6b62\u6848\u7b56\u5b9a\u8cbb\u7528<\/li>\n<li>\u518d\u767a\u9632\u6b62\u7b56\u5c0e\u5165\u8cbb\u7528<\/li>\n<li>\u5229\u76ca\u640d\u5bb3<\/li>\n<li>\u305d\u306e\u4ed6<\/li>\n<\/ul>\n<\/blockquote>\n<p>\u203b TrendMicro\u300c\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u95a2\u3059\u308b\u88ab\u5bb3\u30b3\u30b9\u30c8\u8abf\u67fb\u300d\u3092\u767a\u8868\u300d<a id=\"fnref3\" class=\"footnoteRef\" href=\"#fn3\"><sup>3<\/sup><\/a> \u3088\u308a<\/p>\n<p>\u4e00\u5ea6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u306b\u8d77\u3053\u308b\u76f4\u63a5\u7684\u306a\u91d1\u92ad\u7684\u306a\u88ab\u5bb3\u3060\u3051\u3067\u306f\u306a\u304f\u3001\u4fe1\u7528\u306e\u5931\u589c\u306b\u3088\u308b\u53d6\u5f15\u4e0a\u306e\u6a5f\u4f1a\u640d\u5931\u3001\u3055\u3089\u306b\u306f\u60c5\u5831\u88ab\u5bb3\u306b\u3088\u308b\u793e\u4f1a\u7684\u306a\u5f71\u97ff\u7b49\u3001\u5358\u306a\u308b\u60c5\u5831\u6f0f\u6d29\u3084\u98a8\u8a55\u88ab\u5bb3\u3068\u3044\u3046\u3060\u3051\u3067\u306f\u53ce\u307e\u3089\u306a\u3044\u3001\u4f01\u696d\u5b58\u7d9a\u306b\u304b\u304b\u308f\u308b\u30ea\u30b9\u30af\u304c\u767a\u751f\u3059\u308b\u6050\u308c\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<h2 id=\"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8981\u54e1\u306e\u78ba\u4fdd\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8981\u54e1\u306e\u78ba\u4fdd<\/h2>\n<p>\u4e00\u65b9\u3067\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u884c\u3046\u306b\u3042\u305f\u3063\u3066\u5fc5\u8981\u306a\u4eba\u6750\u3092\u78ba\u4fdd\u3057\u4f53\u5236\u3092\u6574\u3048\u3088\u3046\u3068\u3057\u3066\u3082\u3001\u5fc5\u305a\u3057\u3082\u5fc5\u8981\u306a\u4eba\u6750\u304c\u78ba\u4fdd\u3067\u304d\u308b\u3068\u306f\u9650\u308a\u307e\u305b\u3093\u30022020\u5e74\u306b\u306f 19\u4e07\u4eba\u4ee5\u4e0a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4eba\u6750\u304c\u4e0d\u8db3<a id=\"fnref4\" class=\"footnoteRef\" href=\"#fn4\"><sup>4<\/sup><\/a> \u3059\u308b\u3068\u306e\u63a8\u8a08\u3082\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>\u307e\u305f\u4eee\u306b\u9ad8\u5ea6\u306a\u77e5\u8b58\u3092\u6709\u3059\u308b\u8981\u54e1\u3092\u305d\u308d\u3048\u308b\u3053\u3068\u304c\u3067\u304d\u305f\u3068\u3057\u3066\u3082\u3001\u305d\u306e\u3088\u3046\u306a\u4eba\u6750\u3092\u5e38\u6642\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u76e3\u8996\u306e\u305f\u3081\u306b\u5f85\u6a5f\u3055\u305b\u3066\u304a\u304f\u3053\u3068\u306f\u52b9\u7387\u7684\u3068\u306f\u8a00\u3048\u306a\u3044\u3067\u3057\u3087\u3046\u3002<\/p>\n<h2 id=\"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u306e\u81ea\u52d5\u5316\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u306e\u81ea\u52d5\u5316<\/h2>\n<p>\u305d\u306e\u305f\u3081 \u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u306b\u304a\u3044\u3066\u3082\u81ea\u52d5\u5316\u3059\u308b\u3053\u3068\u304c\u5fc5\u8981\u3068\u306a\u308a\u307e\u3059\u3002DevSecOps \u3084 SOAR (Security Orchestration, Automation and Response) \u3068\u547c\u3070\u308c\u308b\u5206\u91ce\u3067\u3059\u3002<\/p>\n<p>\u81ea\u52d5\u5316\u306e\u30d5\u30a1\u30fc\u30b9\u30c8\u30b9\u30c6\u30c3\u30d7\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u691c\u51fa\u3067\u3059\u3002\u691c\u51fa\u3067\u304d\u306a\u3051\u308c\u3070\u4f55\u3082\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u305b\u3093\u3002\u4eca\u56de\u3054\u7d39\u4ecb\u3055\u305b\u3066\u3044\u305f\u3060\u304f\u300cAmazon GuardDuty\u300d\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u691c\u51fa\u3092\u62c5\u3046\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3068\u306a\u308a\u307e\u3059\u3002<\/p>\n<h2 id=\"amazon-guardduty\u3067\u306e\u8105\u5a01\u306e\u691c\u51fa\u65b9\u6cd5\">Amazon GuardDuty\u3067\u306e\u8105\u5a01\u306e\u691c\u51fa\u65b9\u6cd5<\/h2>\n<p>Amazon GuardDuty \u3067\u306f\u4ee5\u4e0b\u306e\u30ed\u30b0\u3092\u76e3\u8996\u3057\u8105\u5a01\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li>VPC Flow Logs (\u901a\u4fe1\u306e\u8a18\u9332)<\/li>\n<li>AWS CloudTrail event logs (AWS\u306e\u64cd\u4f5c\u8a18\u9332)<\/li>\n<li>DNS logs (\u53c2\u7167\u3057\u3066\u3044\u308bURL\u3084\u30c9\u30e1\u30a4\u30f3\u306e\u8a18\u9332)<\/li>\n<\/ul>\n<p>\u4e0a\u8a18\u306e\u8a18\u9332\u304b\u3089\u3001\u7591\u308f\u3057\u3044\u901a\u4fe1\u30d1\u30bf\u30fc\u30f3\u3084\u3001\u30c9\u30e1\u30a4\u30f3\u540d\u3001\u901a\u4fe1\u5148\u7b49\u3092\u904e\u53bb\u306e\u77e5\u898b\u3068 A.I. \u306b\u3088\u308b\u691c\u51fa(\u30d1\u30bf\u30fc\u30f3\u691c\u51fa\u3001\u7570\u5e38\u691c\u51fa)\u3092\u99c6\u4f7f\u3057\u3066\u8105\u5a01\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/p>\n<h2 id=\"amazon-guardduty\u3067\u691c\u51fa\u3067\u304d\u308b\u8105\u5a01\">Amazon GuardDuty\u3067\u691c\u51fa\u3067\u304d\u308b\u8105\u5a01<\/h2>\n<p>Amazon GuardDuty \u3067\u306f\u4ee5\u4e0b\u306e\u8105\u5a01\u3092\u691c\u51fa\u3067\u304d\u307e\u3059\u3002\u8a73\u7d30\u306f Amazon GuardDuty \u306e\u30de\u30cb\u30e5\u30a2\u30eb<a id=\"fnref5\" class=\"footnoteRef\" href=\"#fn5\"><sup>5<\/sup><\/a> \u306b\u8b72\u308a\u307e\u3059\u304c\u3053\u3053\u3067\u306f\u691c\u51fa\u3067\u304d\u308b\u8105\u5a01\u306e\u6982\u8981\u3060\u3051\u793a\u3057\u307e\u3059\u3002\u306a\u304a\u7d50\u679c\u30bf\u30a4\u30d7\u306f\u8ffd\u52a0\u3001\u524a\u9664\u3055\u308c\u308b\u3053\u3068\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<h3 id=\"backdoor-\u7d50\u679c\u30bf\u30a4\u30d7\">Backdoor \u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>EC2 \u30a4\u30f3\u30b9\u30bf\u30f3\u30b9\u306b\u4ed5\u8fbc\u307e\u308c\u305f\u30d0\u30c3\u30af\u30c9\u30a2\u7b49\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u6d3b\u52d5\u3092\u691c\u51fa\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>Backdoor:EC2\/XORDDOS<\/li>\n<li>Backdoor:EC2\/Spambot<\/li>\n<li>Backdoor:EC2\/C&amp;CActivity.B!DNS<\/li>\n<li>Backdoor:EC2\/DenialOfService.Tcp<\/li>\n<li>Backdoor:EC2\/DenialOfService.Udp<\/li>\n<li>Backdoor:EC2\/DenialOfService.Dns<\/li>\n<li>Backdoor:EC2\/DenialOfService.UdpOnTcpPorts<\/li>\n<li>Backdoor:EC2\/DenialOfService.UnusualProtocol<\/li>\n<\/ul>\n<h3 id=\"behavior-\u7d50\u679c\u30bf\u30a4\u30d7\">Behavior \u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>\u901a\u5e38\u60f3\u5b9a\u3055\u308c\u308b\u52d5\u4f5c\u3068\u306f\u7570\u306a\u308b\u52d5\u4f5c\u3092\u691c\u51fa\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>Behavior:EC2\/NetworkPortUnusual<\/li>\n<li>Behavior:EC2\/TrafficVolumeUnusual<\/li>\n<\/ul>\n<h3 id=\"cryptocurrency-\u7d50\u679c\u30bf\u30a4\u30d7\">CryptoCurrency \u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>\u30d3\u30c3\u30c8\u30b3\u30a4\u30f3\u30de\u30a4\u30cb\u30f3\u30b0\u304c\u884c\u308f\u308c\u3066\u3044\u308b\u5146\u5019\u3092\u76e3\u8996\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>CryptoCurrency:EC2\/BitcoinTool.B!DNS<\/li>\n<li>CryptoCurrency:EC2\/BitcoinTool.B<\/li>\n<\/ul>\n<h3 id=\"pentest-\u7d50\u679c\u30bf\u30a4\u30d7\">PenTest \u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>\u4fb5\u5165\u30c6\u30b9\u30c8\u304c\u884c\u308f\u308c\u3066\u3044\u306a\u3044\u304b\u76e3\u8996\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>PenTest:IAMUser\/KaliLinux<\/li>\n<li>PenTest:IAMUser\/ParrotLinux<\/li>\n<li>PenTest:IAMUser\/PentooLinux<\/li>\n<\/ul>\n<h3 id=\"persistence-\u7d50\u679c\u30bf\u30a4\u30d7\">Persistence \u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>AWS \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30af\u30bb\u30b9\u8a31\u53ef\u306e\u5909\u66f4\u3092\u691c\u51fa\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>Persistence:IAMUser\/NetworkPermissions<\/li>\n<li>Persistence:IAMUser\/ResourcePermissions<\/li>\n<li>Persistence:IAMUser\/UserPermissions<\/li>\n<\/ul>\n<h3 id=\"\u30dd\u30ea\u30b7\u30fc\u7d50\u679c\u30bf\u30a4\u30d7\">\u30dd\u30ea\u30b7\u30fc\u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>\u30eb\u30fc\u30c8\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u4f7f\u7528\u306b\u3064\u3044\u3066\u5831\u544a\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>Policy:IAMUser\/RootCredentialUsage<\/li>\n<\/ul>\n<h3 id=\"recon-\u691c\u7d22\u30bf\u30a4\u30d7\">Recon \u691c\u7d22\u30bf\u30a4\u30d7<\/h3>\n<p>\u7570\u5e38\u306a\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u6d3b\u52d5\u3092\u89b3\u6e2c\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>Recon:EC2\/PortProbeUnprotectedPort<\/li>\n<li>Recon:IAMUser\/TorIPCaller<\/li>\n<li>Recon:IAMUser\/MaliciousIPCaller.Custom<\/li>\n<li>Recon:IAMUser\/MaliciousIPCaller<\/li>\n<li>Recon:EC2\/Portscan<\/li>\n<li>Recon:IAMUser\/NetworkPermissions<\/li>\n<li>Recon:IAMUser\/ResourcePermissions<\/li>\n<li>Recon:IAMUser\/UserPermissions<\/li>\n<\/ul>\n<h3 id=\"resourceconsumption-\u7d50\u679c\u30bf\u30a4\u30d7\">ResourceConsumption \u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>AWS\u30ea\u30bd\u30fc\u30b9\u306e\u5229\u7528\u306b\u3064\u3044\u3066\u691c\u51fa\u3057\u307e\u3059\u3002l \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>ResourceConsumption:IAMUser\/ComputeResources<\/li>\n<\/ul>\n<h3 id=\"stealth-\u7d50\u679c\u30bf\u30a4\u30d7\">Stealth \u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>AWS \u4e0a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a2d\u5b9a\u306b\u3064\u3044\u3066\u691c\u51fa\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>Stealth:IAMUser\/PasswordPolicyChange<\/li>\n<li>Stealth:IAMUser\/CloudTrailLoggingDisabled<\/li>\n<li>Stealth:IAMUser\/LoggingConfigurationModified<\/li>\n<\/ul>\n<h3 id=\"trojan-\u691c\u7d22\u30bf\u30a4\u30d7\">Trojan \u691c\u7d22\u30bf\u30a4\u30d7<\/h3>\n<p>\u7591\u308f\u3057\u3044\u5916\u90e8\u3068\u306e\u901a\u4fe1\u306b\u3064\u3044\u3066\u691c\u51fa\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>Trojan:EC2\/BlackholeTraffic<\/li>\n<li>Trojan:EC2\/DropPoint<\/li>\n<li>Trojan:EC2\/BlackholeTraffic!DNS<\/li>\n<li>Trojan:EC2\/DriveBySourceTraffic!DNS<\/li>\n<li>Trojan:EC2\/DropPoint!DNS<\/li>\n<li>Trojan:EC2\/DGADomainRequest.B<\/li>\n<li>Trojan:EC2\/DGADomainRequest.C!DNS<\/li>\n<li>Trojan:EC2\/DNSDataExfiltration<\/li>\n<li>Trojan:EC2\/PhishingDomainRequest!DNS<\/li>\n<\/ul>\n<h3 id=\"\u672a\u8a31\u53ef\u7d50\u679c\u30bf\u30a4\u30d7\">\u672a\u8a31\u53ef\u7d50\u679c\u30bf\u30a4\u30d7<\/h3>\n<p>\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\u901a\u4fe1\u3092\u691c\u51fa\u3057\u307e\u3059\u3002 \u4ee5\u4e0b\u306e\u8a73\u7d30\u306a\u30bf\u30a4\u30d7\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>UnauthorizedAccess:IAMUser\/TorIPCaller<\/li>\n<li>UnauthorizedAccess:IAMUser\/MaliciousIPCaller.Custom<\/li>\n<li>UnauthorizedAccess:IAMUser\/ConsoleLoginSuccess.B<\/li>\n<li>UnauthorizedAccess:IAMUser\/MaliciousIPCaller<\/li>\n<li>UnauthorizedAccess:EC2\/TorIPCaller<\/li>\n<li>UnauthorizedAccess:EC2\/MaliciousIPCaller.Custom<\/li>\n<li>UnauthorizedAccess:EC2\/SSHBruteForce<\/li>\n<li>UnauthorizedAccess:EC2\/RDPBruteForce<\/li>\n<li>UnauthorizedAccess:IAMUser\/InstanceCredentialExfiltration<\/li>\n<li>UnauthorizedAccess:IAMUser\/ConsoleLogin<\/li>\n<li>UnauthorizedAccess:EC2\/TorClient<\/li>\n<li>UnauthorizedAccess:EC2\/TorRelay<\/li>\n<\/ul>\n<h2 id=\"amazon-guardduty-\u3067\u306e\u691c\u51fa\u5f8c\u306e\u5bfe\u51e6\">Amazon GuardDuty \u3067\u306e\u691c\u51fa\u5f8c\u306e\u5bfe\u51e6<\/h2>\n<p>Amazon GuardDuty \u3067\u306f\u3001\u8105\u5a01\u306e\u691c\u51fa\u306f\u884c\u3044\u307e\u3059\u304c\u5bfe\u5fdc\u306f\u30e6\u30fc\u30b6\u306b\u59d4\u4efb\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u7d44\u7e54\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3084\u30b7\u30b9\u30c6\u30e0\u306e\u69cb\u6210\u3001\u91cd\u8981\u5ea6\u306a\u3069\u306b\u3088\u3063\u3066\u540c\u3058\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e8b\u8c61\u3067\u3042\u3063\u3066\u3082\u5bfe\u51e6\u304c\u7570\u306a\u308b\u305f\u3081\u3067\u3059\u3002<\/p>\n<p>\u691c\u51fa\u3055\u308c\u305f\u8105\u5a01\u306f AWS \u4e0a\u306e\u30ed\u30b0\u7ba1\u7406\u30c4\u30fc\u30eb\u3067\u3042\u308b Amazon CloudWatch Events \u306b\u8a18\u9332\u3055\u308c\u307e\u3059\u3002\u307e\u305f AWS \u4e0a\u306e\u30e1\u30c3\u30bb\u30fc\u30b8\u9023\u643a\u30c4\u30fc\u30eb\u3067\u3042\u308b Amazon SNS \u3092\u901a\u3058\u3066\u3001\u30b9\u30de\u30db\u306b\u30e1\u30c3\u30bb\u30fc\u30b8\u3092\u9001\u4fe1\u3057\u305f\u308a\u3001\u30e1\u30fc\u30eb\u3092\u9001\u4fe1\u3057\u305f\u308a\u3067\u304d\u307e\u3059\u3002<\/p>\n<h2 id=\"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u51e6\u306e\u81ea\u52d5\u5316\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u51e6\u306e\u81ea\u52d5\u5316<\/h2>\n<p>\u3055\u3089\u306b Amazon GuardDuty \u304b\u3089\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30d9\u30f3\u30c8\u3092\u5951\u6a5f\u3068\u3057\u3066 AWS Lambda \u3092\u8aad\u307f\u51fa\u3059\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 AWS Lambda \u3067\u306f\u5236\u9650\u304c\u3042\u308b\u3082\u306e\u306e\u4efb\u610f\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u5b9f\u884c\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u8208\u5473\u6df1\u3044\u306e\u306f\u4ed6\u30b7\u30b9\u30c6\u30e0\u3068\u306e\u9023\u643a\u3067\u3057\u3087\u3046\u3002\u4f8b\u3048\u3070 TrendMicro DeepSecurity \u3068\u306e\u9023\u643a\u3067\u3059\u3002TrendMicro DeepSecurity \u3067\u306f\u4ed6\u30b7\u30b9\u30c6\u30e0\u3068\u306e\u9023\u643a\u306e\u305f\u3081\u306b API (\u4ed6\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u304b\u3089\u6a5f\u80fd\u3092\u547c\u3073\u51fa\u3059\u4ed5\u7d44\u307f) \u304c\u516c\u958b\u3055\u308c\u3066\u304a\u308a\u3001AWS Lambda \u304b\u3089 API \u3092\u901a\u3058\u3066 TrendMicro DeepSecurity \u306e\u6a5f\u80fd\u3092\u547c\u3073\u51fa\u3059\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u307e\u305f\u9023\u643a\u306e\u5b9f\u88c5\u4f8b\u3082\u516c\u958b\u3055\u308c\u3066\u3044\u307e\u3059\u3002<a id=\"fnref6\" class=\"footnoteRef\" href=\"#fn6\"><sup>6<\/sup><\/a><\/p>\n<p>\u4f8b\u3048\u3070\u7591\u308f\u3057\u3044 EC2 \u30a4\u30f3\u30b9\u30bf\u30f3\u30b9 (\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf) \u3092\u691c\u51fa\u3057\u305f\u5834\u5408\u306b\u30a6\u30a3\u30eb\u30b9\u30b9\u30ad\u30e3\u30f3\u3092\u5b9f\u884c\u3057\u3001\u307e\u305f\u901a\u4fe1\u3092\u906e\u65ad\u3059\u308b\u3001\u30ed\u30b0\u3092\u4fdd\u5b58\u3059\u308b\u306a\u3069\u306e\u52d5\u4f5c\u3092\u81ea\u52d5\u7684\u306b\u5b9f\u884c\u3059\u308b\u3053\u3068\u304c\u53ef\u80fd\u3067\u3059\u3002<\/p>\n<p>\u4ee5\u4e0a\u3001\u53c2\u8003\u306b\u3057\u3066\u3044\u305f\u3060\u3051\u308c\u3070\u5e78\u3044\u3067\u3059\u3002<\/p>\n<div class=\"footnotes\">\n<hr \/>\n<ol>\n<li id=\"fn1\">\u7d4c\u6e08\u7523\u696d\u7701\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7d4c\u55b6\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3 v2.0\u300d(<a href=\"https:\/\/www.meti.go.jp\/policy\/netsecurity\/downloadfiles\/CSM_Guideline_v2.0.pdf\">PDF<\/a>)<a href=\"#fnref1\">\u21a9<\/a><\/li>\n<li id=\"fn2\">TrendMicro\u300c\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u95a2\u3059\u308b\u88ab\u5bb3\u30b3\u30b9\u30c8\u8abf\u67fb\u300d\u3092\u767a\u8868\u300d(<a href=\"https:\/\/www.trendmicro.com\/ja_jp\/about\/press-release\/2018\/pr-20180828-01.html\">html<\/a>)<a href=\"#fnref2\">\u21a9<\/a><\/li>\n<li id=\"fn3\">TrendMicro\u300c\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u95a2\u3059\u308b\u88ab\u5bb3\u30b3\u30b9\u30c8\u8abf\u67fb\u300d\u3092\u767a\u8868\u300d(<a href=\"https:\/\/www.trendmicro.com\/ja_jp\/about\/press-release\/2018\/pr-20180828-01.html\">html<\/a>)<a href=\"#fnref3\">\u21a9<\/a><\/li>\n<li id=\"fn4\">\u7dcf\u52d9\u7701\u300c\u6211\u304c\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4eba\u6750\u306e\u73fe\u72b6\u306b\u3064\u3044\u3066\u300d(<a href=\"http:\/\/www.soumu.go.jp\/main_content\/000591470.pdf\">PDF<\/a>)<a href=\"#fnref4\">\u21a9<\/a><\/li>\n<li id=\"fn5\"><a href=\"https:\/\/docs.aws.amazon.com\/ja_jp\/guardduty\/latest\/ug\/guardduty_finding-types-active.html\">GuardDuty \u306e\u30a2\u30af\u30c6\u30a3\u30d6\u306a\u7d50\u679c\u30bf\u30a4\u30d7<\/a><a href=\"#fnref5\">\u21a9<\/a><\/li>\n<li id=\"fn6\"><a href=\"https:\/\/automation.deepsecurity.trendmicro.com\/article\/12_1\/integrate-deep-security-with-aws-services?platform=dsaas\">Integrate Deep Security with AWS Services<\/a><a href=\"#fnref6\">\u21a9<\/a><\/li>\n<\/ol>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u7d4c\u55b6\u8ab2\u984c\u3068\u3057\u3066\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u8fd1\u6642 IT \u3092\u6d3b\u7528\u3057\u305f\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\uff08DX\uff09\u304c\u7d4c\u55b6\u9769\u65b0\u306e\u305f\u3081\u306b\u6b20\u304b\u305b\u306a\u3044\u8981\u7d20\u3068\u3057\u3066\u8a8d\u8b58\u3055\u308c\u308b\u3088\u3046\u306b\u306a\u3063\u3066\u304d\u307e\u3057\u305f\u3002 \u4e00\u65b9\u3067\u81ea\u52d5\u8eca\u3084\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u306b\u4ee3\u8868\u3055\u308c\u308b\u3001\u3059\u3079\u3066&#8230;<\/p>\n","protected":false},"author":1,"featured_media":16424,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_locale":"ja","_original_post":"16422","footnotes":""},"categories":[20,19,7],"tags":[527,616],"class_list":{"0":"post-16422","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-aws","8":"category-19","9":"category-security","10":"tag-amazon-guardduty","11":"tag-616","12":"ja"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/posts\/16422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/comments?post=16422"}],"version-history":[{"count":4,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/posts\/16422\/revisions"}],"predecessor-version":[{"id":18033,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/posts\/16422\/revisions\/18033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/media\/16424"}],"wp:attachment":[{"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/media?parent=16422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/categories?post=16422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/tags?post=16422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}