heroui logo

AWS Password Policy Changes

Splunk Security Content

View Source
Summary
This rule is designed to detect modifications to the password policy of an AWS account by monitoring specific API calls captured in AWS CloudTrail logs. It identifies the events associated with viewing, updating, or deleting the password policy, namely 'UpdateAccountPasswordPolicy', 'GetAccountPasswordPolicy', and 'DeleteAccountPasswordPolicy'. Such actions, especially when performed by non-administrative users, could indicate an adversarial attempt to compromise security by weakening password requirements. The presence of these logs therefore serves as a critical metric for spotting potential security breaches. If these changes are flagged, they warrant further investigation to ensure the integrity of user accounts and to address any security risks posed by unauthorized access, which might lead to more extensive exploitation of AWS resources.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Logon Session
  • Cloud Storage
ATT&CK Techniques
  • T1201
Created: 2024-11-14