heroui logo

AWS SAML Activity

Panther Rules

View Source
Summary
The AWS SAML Activity detection rule is designed to identify suspicious activity related to the Security Assertion Markup Language (SAML) operations within Amazon Web Services (AWS). SAML is often utilized for enabling single sign-on (SSO) capabilities and federating user identities from external identity providers into AWS. This rule tracks key management events involving SAML providers, such as their creation, deletion, or updates, to detect potential unauthorized attempts at accessing sensitive resources or backdoor methods by adversaries via SAML. Specific event actions that are monitored include 'CreateSAMLProvider', 'DeleteSAMLProvider', and 'UpdateSAMLProvider'. The rule is intended to trigger alerts when these actions are detected, particularly if they occur from unexpected sources or under suspicious conditions, such as from a service account that is not typically used for these types of operations. The rule is configured to run with a deduplication period of 60 minutes to avoid creating duplicate alerts, allowing security teams to concentrate on verified incidents of concern.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Service
  • Application Log
Created: 2022-10-14