heroui logo

AWS SAML Update identity provider

Splunk Security Content

View Source
Summary
The rule detects updates to the SAML provider in AWS, leveraging AWS CloudTrail logs to identify the `UpdateSAMLProvider` event. It analyzes key fields such as `sAMLProviderArn`, `sourceIPAddress`, and details from `userIdentity`. The importance of this detection lies in its ability to identify potential perimeter compromises of federated credentials or unauthorized access set by malicious actors. The ability to monitor these updates is crucial; any confirmed malicious activity may lead to identity federation manipulation, allowing attackers access to cloud resources and sensitive data. As such, this rule is significant for maintaining the security integrity of cloud environments and safeguarding against identity theft and unauthorized access.
Categories
  • Cloud
  • AWS
Data Sources
  • Pod
  • Container
  • User Account
  • Cloud Service
ATT&CK Techniques
  • T1078
Created: 2024-11-14