heroui logo

AWS.CloudTrail.UserAccessKeyAuth

Panther Rules

View Source
Summary
The AWS.CloudTrail.UserAccessKeyAuth rule is designed to monitor AWS CloudTrail logs for any unauthorized access attempts and successes involving user access keys. This detection rule is classified under the severity level 'Info' and is enabled to issue alerts about significant events related to access key usage. It specifically checks for actions that fail due to access key restrictions, such as 'AccessDenied' errors when a user tries to perform restricted actions, as well as successful access key validations like 'GetCallerIdentity'. Other checks include events surrounding console logins, which helps in identifying access activities that may not use the typical access keys, such as role assumptions in scenarios where keys are absent. The rule includes a deduplication period of 60 minutes, ensuring that repeated alerts for the same event within this timeframe are suppressed. All logs processed must come from AWS CloudTrail, with the capability to identify various relevant actors, actions, and responses across different AWS accounts.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T2020
  • T1945
Created: 2024-07-15