
Summary
The AWS IAM Group Read Only Events detection rule is designed to monitor and capture read/list events related to Identity and Access Management (IAM) group management within AWS CloudTrail logs. Specifically, this rule identifies various read operations such as 'GetGroup', 'GetGroupPolicy', 'ListAttachedGroupPolicies', 'ListGroups', and 'ListGroupsForUser' — these operations allow users to view details about IAM groups, including their policies and memberships. The rule incorporates a specific test that verifies the occurrence of these actions and ensures they are logged correctly under the expected criteria (event category as Management, event source as iam.amazonaws.com, etc.). The rule is configured to track potentially suspicious activity by observing patterns in user behavior through analysis of subsequent events triggered by a user following these read events.
Categories
- Cloud
- AWS
- Identity Management
Data Sources
- Cloud Storage
- Application Log
- User Account
ATT&CK Techniques
- T1069
Created: 2023-01-06