heroui logo

AWS Successful Single-Factor Authentication

Splunk Security Content

View Source
Summary
This detection rule identifies successful AWS Console Login authentication events for IAM user accounts where Multi-Factor Authentication (MFA) is not enabled, utilizing AWS CloudTrail logs. This activity is noteworthy because accessing the AWS console without MFA could indicate a potential misconfiguration or policy violation, raising concerns for account security. If this event is spaced on malicious intent, it could result in unauthorized access to the AWS environment, possibly facilitating data exfiltration, resource manipulation, or escalation of privileges within the account. The rule captures logins marked as successful, filtering out those that utilized MFA by searching for 'additionalEventData.MFAUsed' set to 'No'. Alerts are generated to prompt a thorough security investigation on accounts lacking MFA usage, thus enforcing a critical security posture in AWS environments.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
ATT&CK Techniques
  • T1621
  • T1078
  • T1586
  • T1586.003
  • T1078.004
Created: 2024-11-14