heroui logo

Root Account Access Key Created

Panther Rules

View Source
Summary
The rule 'Root Account Access Key Created' is designed to detect the creation of an access key for the AWS root account using AWS CloudTrail logs. The rule operates by monitoring specific AWS API calls (particularly 'CreateAccessKey' from the 'iam.amazonaws.com' service) made by the root user. If an access key is created, especially for the root account, it raises a significant security concern since root accounts should be protected and ideally have their access keys managed very carefully. The rule will trigger an alert whenever an access key creation event is detected, specifying critical details like the source IP address, user agent, and creation date. In such instances, a follow-up verification process is recommended to ascertain the legitimacy of the access key creation and mitigate potential security risks.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1098
Created: 2022-09-02