
Summary
This rule identifies potential brute-force attempts to bypass Multi-Factor Authentication (MFA) for AWS accounts by monitoring AWS CloudTrail logs for multiple failed MFA requests. Specifically, it triggers when more than 10 failed MFA attempts are recorded for a single user within a 5-minute window. The underlying concern is that an adversary may be attempting to exploit weak MFA implementations by overwhelming the authentication system with requests, potentially leading to unauthorized access. The rule utilizes the `additionalEventData` field in CloudTrail logs to capture these details effectively. Implementing this rule can provide significant visibility into potentially malicious activities targeting AWS accounts and enhance the security stance against account takeovers.
Categories
- Cloud
- AWS
- Identity Management
Data Sources
- Cloud Service
- User Account
- Application Log
ATT&CK Techniques
- T1621
- T1586
- T1586.003
Created: 2024-11-14