heroui logo

AWS Attach IAM Group Policy

Anvilogic Forge

View Source
Summary
This rule focuses on detecting changes to AWS IAM (Identity and Access Management) groups related to privilege escalation by monitoring AWS CloudTrail logs for specific actions. It specifically looks for instances where a policy is attached to an IAM group via events named 'AttachGroupPolicy' or 'PutGroupPolicy' within the last two hours. Attackers may exploit this behavior to elevate their privileges by manipulating IAM group policies, which is captured by the referenced technique ID T1078.004 relating to valid accounts and privilege escalation in cloud environments. This detection aids in identifying unauthorized or suspicious policy modifications that could compromise the security of AWS resources.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
  • Application Log
ATT&CK Techniques
  • T1078.004
Created: 2024-02-09