heroui logo

ASL AWS Create Access Key

Splunk Security Content

View Source
Summary
The 'ASL AWS Create Access Key' detection rule aims to identify instances in AWS where IAM access keys are created by one user for another user, which can signal potential privilege escalation attempts. Utilizing AWS CloudTrail logs, this rule tracks the 'CreateAccessKey' API operation and evaluates the relationship between the actor (the user creating the key) and the target user (the user for whom the key is created). When the actor and the target user differ, it flags the event as potentially suspicious. This detection is particularly important as unauthorized access keys can provide attackers with means to maintain persistence in the environment or extract sensitive data via AWS APIs. If such a threat is confirmed, it could result in serious security breaches including unauthorized service access and data exfiltration.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Logon Session
ATT&CK Techniques
  • T1136.003
  • T1136
  • T1078
Created: 2024-12-12