heroui logo

AWS IAM AdministratorAccess Policy Attached to Group

Elastic Detection Rules

View Source
Summary
This threat detection rule is designed to identify potentially malicious use of the AWS IAM `AttachGroupPolicy` API operation. The objective is to uncover unauthorized attachment of the `AdministratorAccess` managed policy to user groups, an action which can indicate privilege escalation or persistence tactics employed by adversaries utilizing compromised credentials. The query specifically looks for successful actions performed through the IAM service, focusing on any instances where the `policyName` is set to `AdministratorAccess`. The important investigative steps outlined include validating the legitimacy of the action based on user identity, reviewing IAM policies, analyzing associated historical activity, and checking for unusual user agent values and geolocation data of the API request. Furthermore, careful triage responses recommend promptly investigating suspected compromises, enforcing strict access controls, and taking steps to mitigate any potential fallout as a result of the detected activity.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Service
  • User Account
  • Cloud Storage
  • Network Traffic
ATT&CK Techniques
  • T1098
  • T1098.003
Created: 2024-05-31