heroui logo

AWS IAM AdministratorAccess Policy Attached to User

Elastic Detection Rules

View Source
Summary
This rule, authored by Elastic, focuses on detecting potential privilege escalation in AWS IAM by monitoring the use of the `AttachUserPolicy` API operation to attach the `AdministratorAccess` policy to a user account. When adversaries gain access to compromised credentials, they may use this operation to enhance their privileges within the AWS environment, posing a significant security risk. The rule is designed to capture successful occurrences of this API call and will trigger an alert if the policy being attached is `AdministratorAccess`, which confers unrestricted access to AWS services and resources. The query is structured to check logs from AWS CloudTrail, specifically filtering for events that show the attachment of `AdministratorAccess` to users. The effective monitoring of this activity is critical for identifying potential account manipulation, persistence tactics, and ensuring the integrity of user accounts in AWS.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Service
  • User Account
  • Network Traffic
ATT&CK Techniques
  • T1098
  • T1098.003
Created: 2024-05-30