heroui logo

AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts

Elastic Detection Rules

View Source
Summary
Correlates open AWS IAM long-term access key detections by key ID (prefix AKIA). The rule links multiple open alerts that share the same access_key_id when there is an initial 'Long-Term Access Key First Seen from Source IP' alert and at least one additional open alert for the same key with medium, high, or critical severity. This higher-order rule helps surface potential post-compromise activity by correlating credential-related detections across the same IAM key, enabling faster investigation and response. The rule uses Esql to group signals by aws.cloudtrail.user_identity.access_key_id and requires the co-occurrence of a first-seen-IP alert and at least one elevated alert for the same key to trigger. It returns per-source IP statistics, the count of the long-term key first-seen events, the count of elevated sibling alerts, and related rule identifiers and risk scores for investigation.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
ATT&CK Techniques
  • T1552
  • T1078
  • T1078.004
Created: 2026-04-06