heroui logo

Detect Brute-Forcing Permissions (AWS)

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify potential brute force attempts aimed at AWS IAM permissions through CloudTrail logs. In AWS, permissions control access to resources, and typically IAM entities start with no permissions. Attackers who obtain access to credentials can use automated brute-force techniques to enumerate IAM roles, users, and the permissions tied to them. The Snowflake SQL logic included in the rule queries the 'awscloudtrail' logs for events within the last two hours where the identity type is 'IAMUser' and the event type is 'AwsApiCall'. This helps in monitoring unauthorized attempts to gain access to IAM permissions by closely examining API calls that employees or attackers make. By combining the data from CloudTrail logs and identifying suspicious patterns, this rule aims to proactively flag brute-forcing attempts before they can escalate into real threats.
Categories
  • Cloud
Data Sources
  • Cloud Storage
  • Application Log
ATT&CK Techniques
  • T1069
Created: 2024-02-09