heroui logo

AWS IAM SAML Provider Updated

Elastic Detection Rules

View Source
Summary
The rule 'AWS IAM SAML Provider Updated' is designed to detect unauthorized modifications to Security Assertion Markup Language (SAML) providers in Amazon Web Services (AWS) that facilitate federated access to the AWS Management Console. It specifically looks for successful updates to SAML providers, which may indicate attempts by an attacker to escalate privileges. This rule leverages AWS CloudTrail logs to monitor and identify changes initiated by users or roles with the UpdateSAMLProvider event action. False positives may occur in cases of routine updates by authorized administrators or automated systems, thus necessitating thorough investigation and exception handling for known legitimate activities. The rule also emphasizes the importance of monitoring and reviewing IAM activities surrounding these modifications to identify any potential security incidents.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Service
  • Application Log
  • User Account
ATT&CK Techniques
  • T1484
  • T1484.002
Created: 2021-09-22