
Summary
This detection rule identifies modifications to AWS user login profiles, specifically through the UpdateLoginProfile action in IAM (Identity and Access Management). An attacker gaining the iam:UpdateLoginProfile permission can change passwords for other users, which may signal a legitimate administrative action or potential unauthorized access. Monitoring this action is critical for maintaining security, especially if it occurs outside of usual administrative patterns. The rule's structure checks for specific parameters, including the username and whether a password reset is required, to evaluate whether this change is expected or potentially harmful. It is categorized under multiple MITRE ATT&CK techniques, indicating its relevance to various attack vectors targeting identity management and user access.
Categories
- Cloud
- Identity Management
Data Sources
- Cloud Service
- User Account
ATT&CK Techniques
- T1098
- T1108
- T1550
Created: 2022-09-27