If this detection indicates a genuine threat, the organization faces significant risks:
AWS Suspect Credential Access from SSM
Steps to investigate
AWS Suspect Credential Access from SSM
MITRE ATT&CK techniques covered
No items found.
AWS Suspect Credential Access from SSM
Related detections
No items found.
See our detections in action
Our interactive demo provides a deep dive into the advanced capabilities of our cybersecurity platform, showcasing real-time detection, comprehensive analysis, and proactive threat mitigation.
Don't just read about the possibilities – experience them.