6.2 Account Hijacking – Dashboards and Reports

Select > Reports > Portal > Repository > Standard Content > Cloud > CSA > The Treacherous 12.

CSA identifies the hijacking of accounts and services as an ongoing, top threat. Malicious users might hijack accounts by phishing, fraud, and exploiting software vulnerabilities. In the cloud, the hijackers can eavesdrop on organizational activities, manipulate data, and redirect your clients.

To search for potential threats, use the following dashboards and report:

Account Hijacking Vulnerabilities

Provides charts of the top 10 vulnerabilities and the number of vulnerabilities over time. This dashboard also includes a table of the vulnerabilities, soyou can review the reporting vendor or device, agent severity, asset, and the asset’s zone.

Man in the Middle Attacks

Provides charts that show man in the middle events by time, source address, destination address, source MAC address, and destination MAC address.

Phishing Attacks

Provides charts that show the phishing attacks against the organizations.

Principal Invoked an API Commonly used to Discover Information Associated with AWS account

Provides charts that show the principals invoked by an API commonly used to discover information associated with AWS accounts.

Broken Authentication and Session Management

Lists the events that might be associated with broken authentication (possibly hijacked credentials) and session management issues reported by vulnerability scanners in the organization.