heroui logo

ASL AWS Password Policy Changes

Splunk Security Content

View Source
Summary
The ASL AWS Password Policy Changes detection rule is designed to identify suspicious activities related to AWS IAM (Identity and Access Management) password policies within an organization's AWS account. The search leverages AWS CloudTrail logs that have been ingested from Amazon Security Lake, focusing on specific API operations that relate to the management of password policies. The API operations include updating, getting, and deleting the account password policy. Typical use cases of this rule target potential privilege escalation attacks, where unauthorized users might leverage administrative capabilities to inspect or modify password policies, thus increasing their ability to compromise user accounts. The rule emphasizes that regular users are unlikely to perform such actions, suggesting the events logged could indicate malicious activity. To implement the detection, users must have the Splunk Add-On for AWS installed, which supports parsing of logs in the OCSF format. While the rule is deprecated, it highlights the critical importance of monitoring IAM practices to safeguard AWS environments from potential threats arising from compromised accounts or malicious insiders.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Storage
  • Application Log
ATT&CK Techniques
  • T1201
Created: 2024-11-14