
Summary
The rule detects attempts to modify the AWS IAM Assume Role Policy, a technique often exploited by adversaries to escalate privileges within an AWS environment. The Assume Role Policy defines which principals can assume a role. If altered maliciously (e.g., via the 'UpdateAssumeRolePolicy' API), it could allow an attacker to gain unauthorized access to sensitive resources by assuming the modified role. The detection is based on monitoring CloudTrail logs for specific IAM actions related to Assume Role Policies, particularly focusing on successful updates made through these APIs. Investigators must review user actions and their context to differentiate between legitimate changes and potential compromises. It is crucial to evaluate the user's identity and whether their actions align with their intended role, especially if they originate from unfamiliar sources. Potential indicators of compromise are discussed, including investigation steps for correlating alerts, checking change management compliance, and analyzing user account activity within defined timeframes. Lastly, best practices and incident response protocols should be followed to mitigate risks from any detected unauthorized policy modifications.
Categories
- Cloud
- AWS
- Identity Management
Data Sources
- Cloud Storage
- Image
- User Account
- Logon Session
ATT&CK Techniques
- T1078
Created: 2020-07-06