
Summary
This detection rule identifies potential evasion of CloudTrail logging for IAM actions, which can occur when adversaries manipulate policy-related API calls. Specifically, it looks for API calls that pad policy documents with excessive whitespaces to exploit size constraints, resulting in incomplete logging. This manipulation leads CloudTrail to log the policy as 'requestParameters too large' and bypasses critical monitoring, allowing unauthorized changes to remain undetected. The rule is triggered upon detection of specific IAM API calls where the request parameters indicate this kind of manipulation, helping to flag suspicious activities that could signify attempted evasion of security auditing.
Categories
- Cloud
- AWS
- Identity Management
Data Sources
- Cloud Service
- User Account
- Network Traffic
ATT&CK Techniques
- T1562
- T1562.008
Created: 2025-06-10