
Summary
This detection rule monitors for specific AWS IAM related actions that could suggest malicious activity, specifically when IAM roles or user policies are attached to a user. The main events being tracked include 'AttachRolePolicy', 'AttachUserPolicy', 'PutUserPolicy', and 'PutRolePolicy'. These actions may indicate attempts to escalate privileges or maintain persistence by associating roles/policies with user accounts, particularly in cloud environments where compromised credentials or misuse can lead to further exploitations. The rule leverages CloudTrail logs and checks for these events that occurred within the last two hours, aiming to identify unusual or unauthorized adjustments to user permissions that could compromise security if not detected promptly.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Application Log
ATT&CK Techniques
- T1078.004
Created: 2024-02-09