heroui logo

ASL AWS Concurrent Sessions From Different Ips

Splunk Security Content

View Source
Summary
This rule identifies potentially malicious activity related to AWS IAM accounts through the detection of concurrent user sessions originating from multiple unique IP addresses within a 5-minute interval. It utilizes AWS CloudTrail logs, particularly the `DescribeEventAggregates` API call, to detect discrepancies in session IP addresses. This behavior may suggest session hijacking, where an attacker could exploit stolen session tokens to gain unauthorized access to AWS resources, posing serious security risks, including data breaches or unauthorized actions in sensitive environments. It is essential to monitor iterative IP address usage over a short time frame to mitigate risks linked to potential account compromises.
Categories
  • Cloud
  • AWS
Data Sources
  • Pod
  • Container
  • Cloud Service
ATT&CK Techniques
  • T1185
Created: 2024-11-14