heroui logo

ASL AWS UpdateLoginProfile

Splunk Security Content

View Source
Summary
The ASL AWS UpdateLoginProfile rule detects changes made to the login profiles of AWS users through CloudTrail events, where the user effecting the change is not the one whose profile is being modified. This situation can signify potential privilege escalation attempts, typically indicative of an attacker leveraging a compromised credential to modify permissions or gain unauthorized access to resources. By monitoring and analyzing these CloudTrail logs, security teams can pinpoint unusual behavior that could lead to further security breaches within the AWS environment.
Categories
  • Cloud
  • AWS
Data Sources
  • Pod
  • Container
  • User Account
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1136.003
  • T1136
  • T1078
Created: 2025-01-09