heroui logo

AWS CreateLoginProfile

Anvilogic Forge

View Source
Summary
The detected rule focuses on identifying events related to the creation of a login profile for IAM users within AWS. The CreateLoginProfile function allows threat actors to set up passwords for specified IAM users, enabling their login access to the AWS Management Console. This detection is critical as modifying user permissions aligns with persistence tactics employed by malicious actors, ensuring they maintain access after an initial compromise. The Splunk logic retrieves CloudTrail logs pertaining to CreateLoginProfile activity and compiles relevant details, such as timestamps, user identity, source IP addresses, and other contextual information, facilitating quick identification and mitigation of unauthorized access attempts. By correlating log data, including geolocation insights and DNS resolution, the rule enhances situational awareness regarding potential threats to AWS environments.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
  • Process
ATT&CK Techniques
  • T1098
Created: 2024-02-09