
Summary
The rule titled 'AWS AWSLambdaBasicExecutionRole Attached' detects the attachment of the AWSLambdaBasicExecutionRole policy in AWS CloudTrail logs. This policy is typically employed to grant Lambda functions the necessary permissions to write logs to Amazon CloudWatch. While its presence is common in legitimate serverless applications, an attachment in unexpected contexts or by unauthorized users raises concerns about potential malicious activities. Threat actors may exploit this role to deploy and execute Lambda functions that serve their malicious intents, such as running backdoor code or staging payloads for further exploitation. This detection rule categorizes events triggered by actions such as 'CreateUser', 'PutRolePolicy', or 'AttachRolePolicy' related to the AWSLambdaBasicExecutionRole, thereby allowing security teams to monitor for indicators of misuse linked to serverless architectures. By analyzing these events, organizations can identify suspicious activities, enhance their security posture, and act against possible threats before they materialize into significant security incidents.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- Network Traffic
ATT&CK Techniques
- T1078.004
Created: 2025-05-20