This project establishes real-time monitoring for AWS Secrets Manager access, triggering immediate alerts via Slack/Teams for suspicious activity like IAM Role usage or anomalous access patterns. It leverages CloudTrail, CloudWatch, Lambda, and SNS to provide enhanced security visibility into sensitive data access.
Project Components & Uses:
✅ Secret Access Logging (CloudTrail + S3)
Captures all GetSecretValue API calls for auditing.
✅ Real-time Monitoring & Filtering (CloudWatch Logs + Metric Filters)
Analyzes logs instantly to count general vs. IAM Role access.
✅ Anomaly Detection Alerting (CloudWatch Alarms)
Flags unusual deviations from normal secret access patterns.
✅ IAM Role Access Alerting (CloudWatch Alarms)
Triggers immediate alerts specifically for role-based access.
✅ AI-driven Event Summarization (AWS Bedrock + Lambda)
Generates concise, human-readable summaries of access events.
✅ Automated Secret Rotation (Lambda)
Automatically changes secrets if accessed from untrusted IPs (Hardening Step).
✅ Slack/Teams Integration (SNS + Lambda)
Delivers real-time alerts and summaries to communication channels.
✅ Historical Log Analysis & Reporting (Athena + Glue Data Catalog)
Enables SQL querying of raw CloudTrail logs stored in S3.
✅ Interactive Security Dashboards (QuickSight)
Visualizes access trends, user activity, and source IPs.