heroui logo

AWS IAM User with Console Access Login Without MFA

Sigma Rules

View Source
Summary
This rule is designed to detect AWS IAM user login attempts to the AWS Management Console that lack Multi-Factor Authentication (MFA). Given that IAM users with console access can represent a significant security risk if MFA is not enforced, this rule focuses specifically on identifying these high-risk access credentials. The detection mechanism involves monitoring AWS CloudTrail logs for specific events, particularly those that indicate a ConsoleLogin where the MFAUsed attribute is set to 'NO'. This is critical as it helps administrators and security teams respond promptly to potential vulnerabilities posed by accounts that are susceptible to compromise via common attack vectors such as credential stuffing, brute force attacks, or social engineering. Organizations leveraging IAM to manage user permissions should prioritize implementing MFA policies to mitigate these risks.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
Created: 2025-10-18