
Summary
This detection rule is designed to monitor for suspicious activities related to the AWS IAM User or AccessKey creation specifically through the S3 Browser utility. The rule tracks actions that occur within AWS CloudTrail logs, specifically focusing on events coming from IAM (Identity and Access Management) concerning the creation of users or access keys. It does this by filtering CloudTrail logs for events where the event source is 'iam.amazonaws.com', the event name is either 'CreateUser' or 'CreateAccessKey', and the user agent string contains 'S3 Browser'. The presence of these attributes is indicative of potentially unauthorized access and manipulation by threat actors utilizing the S3 Browser for malicious purposes, which aligns with MITRE ATT&CK techniques T1059.009 (Command and Scripting Interpreter: Python) and T1078.004 (Valid Accounts: Cloud Account). The detection's output is flagged with a 'high' severity level due to the critical nature of IAM resources and the potential implications of unauthorized access.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
Created: 2023-05-17