heroui logo

AWS Credential Access Failed Login

Splunk Security Content

View Source
Summary
This detection rule identifies failed login attempts to the AWS Management Console, signifying potentially malicious behavior such as brute force attacks or unauthorized access attempts. It utilizes AWS CloudTrail logs to capture events corresponding to failed authentication actions associated with the AWS ConsoleLogin. Given the critical nature of AWS accounts, repeated failed login attempts could lead to significant security incidents such as data breaches or resource manipulation, thus necessitating robust monitoring measures through this analytic.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1110
  • T1586
  • T1586.003
  • T1110.001
Created: 2024-11-14