heroui logo

AWS CreateGroup

Anvilogic Forge

View Source
Summary
The AWS CreateGroup detection rule is designed to monitor the creation of groups within AWS accounts, which can be an indicator of potential privilege escalation by malicious actors. The logic uses Splunk to filter AWS CloudTrail events specifically for the event type 'CreateGroup', which corresponds to the API call made when a new IAM group is established. The rule collects various data points, including timestamps, user details, geographic information, and permission access, to analyze the event context. By capturing and processing this information, the detection rule can identify unauthorized group creation attempts that could lead to account manipulation or privilege escalation. Additionally, it leverages DNS lookups to enrich the event data with hostnames from the source IP addresses, further aiding in investigation and threat response efforts.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
  • User Account
  • Application Log
ATT&CK Techniques
  • T1098
  • T1078.004
Created: 2024-02-09