heroui logo

IAM Policy Modified

Panther Rules

View Source
Summary
This detection rule, named 'IAM Policy Modified', monitors changes made to AWS IAM policies through CloudTrail logs. It identifies events related to IAM policy modifications, such as creating, updating, or deleting IAM policies. The rule specifically targets the 'DeleteGroupPolicy' action, among others, to detect unauthorized or potentially malicious changes to IAM settings. As IAM policies govern permissions within AWS, any modification in these policies could imply privilege escalation or unauthorized access, making it crucial to monitor these changes. The rule leverages user identity information, request parameters, and event details to verify whether a modification occurred and generates alerts for suspected anomalies in IAM policy modifications. The output of this detection informs security teams to further investigate possible abuse of AWS credentials and permissions.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1548
Created: 2022-09-02