
Summary
This rule is designed to detect the usage of AWS root account credentials. The AWS root account has complete control over all resources in an AWS environment, and its credentials, if compromised or used inappropriately, can lead to significant security risks and privilege escalation. The detection rule looks for events logged in AWS CloudTrail that are associated with the root user identity type, specifically when the event type is categorized as 'AwsServiceEvent'. If root account usage is detected, but the event type does not align with standard AWS service events, it raises a potential security alert. The rule addresses the privileged nature of root account actions and is relevant in evaluating adherence to security best practices by limiting the use of root account credentials. Additionally, potential false positives are noted, such as tasks that necessitate root account credentials, ensuring users can adjust monitoring based on their operational context.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Network Traffic
Created: 2020-01-21