Detect Unauthorized Access to Cloud Secrets Management Stores

ID: DET0130
Domains: Enterprise
Analytics: AN0366
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN0366

Detection of suspicious access to cloud-native secret management systems (AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, HashiCorp Vault). Focuses on abnormal secret retrieval activity, such as secrets being accessed by unusual identities, from unexpected regions, outside business hours, or at high volume. Correlates API calls to secret retrieval with surrounding authentication events, role assumptions, and anomalous execution patterns.

Log Sources
Data Component Name Channel
Cloud Service Enumeration (DC0083) AWS:CloudTrail GetSecretValue
Mutable Elements
Field Description
PrivilegedRoles Set of accounts or roles allowed to retrieve secrets; deviations may indicate misuse.
TimeWindow Temporal window to correlate secret access with authentication and anomalous context.
AccessPatterns Expected frequency and volume of secret retrievals per user/service; anomalies may indicate exfiltration.
RegionConstraints Regions in which secret access is expected; access from unusual geographies may indicate compromise.