
Summary
The rule focuses on detecting updates made to the SAML identity provider within AWS via the `UpdateSAMLProvider` event. It utilizes AWS CloudTrail logs to analyze crucial fields such as `sAMLProviderArn`, `sourceIPAddress`, and user details. The update to the SAML provider is monitored as it could signify potential compromise of federated credentials or unauthorized access, which poses risks to cloud resource security. If detected updates are malicious, it could allow attackers to manipulate identity federation, leading to unauthorized access to sensitive data and resources in the cloud. This detection intends to ensure that any alterations in the SAML configuration are scrutinized to prevent possible security breaches.
Categories
- Cloud
- AWS
Data Sources
- Pod
- Container
- User Account
- Web Credential
- Cloud Service
- Network Traffic
ATT&CK Techniques
- T1078
Created: 2025-01-09