heroui logo

AWS User API Key Created

Panther Rules

View Source
Summary
This rule is designed to detect the creation of AWS API keys for users by other users, a behavior that could indicate unauthorized access or configuration changes that contribute to a potential backdoor allowing persistent access to the AWS environment. The detection is based on CloudTrail logs capturing management events associated with the creation of access keys. Specifically, it monitors the 'CreateAccessKey' event from the IAM service. When one user creates access keys for another user, this could signify that the first user has been compromised or is acting maliciously. The rule categorizes these activities as medium severity threats and generates alerts based on various configurations of the AWS environment, aiming to identify patterns indicating possible backdoor setups in IAM.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Command
ATT&CK Techniques
  • T1098
  • T1108
  • T1550
Created: 2022-10-14