
Summary
The AWS UpdateAssumeRolePolicy detection rule aims to identify potentially malicious actions by threat actors who may alter IAM roles to ensure persistence in compromised AWS cloud accounts. By monitoring the UpdateAssumeRolePolicy events within AWS CloudTrail logs, the rule focuses on changes made to the policy that allows IAM roles to be assumed by designated entities. Such changes are instrumental for attackers to establish footholds in cloud environments by modifying the role trust policies, effectively enabling them to control access and permissions within the account. The detection leverages Splunk capabilities to query AWS logs, extracting key data points such as time, user, account, region, and event details, thus providing rich context for any detected anomalies.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- Network Traffic
ATT&CK Techniques
- T1098.003
Created: 2024-03-08