heroui logo

Root Console Login

Panther Rules

View Source
Summary
The 'Root Console Login' detection rule monitors for logins to the AWS root account through the AWS CloudTrail logs. It aims to identify unauthorized use of the root account, which can lead to potential privilege escalation attacks within an AWS environment. The rule has a high severity level and is enabled by default, requiring a detection period of 15 minutes for deduplication. It references relevant compliance frameworks including CIS benchmarks and MITRE ATT&CK tactics, specifically focusing on valid account access. If a successful root login is detected, the associated attributes include user agent, source IP address, and account IDs, facilitating thorough investigations post-alert. Administrators are advised to act immediately upon detection by reviewing root account activities, revoking unauthorized access, and ensuring immediate change of root credentials if misuse is suspected. The provided reference link offers further information on managing the root user account for AWS environments.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • User Account
  • Logon Session
ATT&CK Techniques
  • T1078
Created: 2022-09-02