
Summary
The rule known as "AWS Unsuccessful MFA attempt" monitors application logs specifically from AWS CloudTrail for suspicious events such as repeated Multi-Factor Authentication (MFA) failures. It targets incidents where MFA is used but fails, indicating potential compromise of a user's primary credentials. By analyzing logs of AWS Console login attempts, the rule identifies patterns of failed MFA requests, which could point to unauthorized access attempts or other malicious activities. If a user attempts more than two unsuccessful MFA logins within a specified deduplication period (15 minutes), the system triggers an alert due to the high severity associated with such violations. The rule is designed to enhance security measures around AWS account access and ensure swift detection of compromised credential scenarios.
Categories
- Cloud
- AWS
- Identity Management
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1621
Created: 2022-12-13