
Summary
The detection rule titled 'ASL AWS CreateAccessKey' focuses on monitoring the creation of AWS IAM access keys, which are critical for API access to AWS services. The rule highlights the dual nature of access key creation: while legitimate for developers and administrators to use for access, it can also serve as a vector for malicious activities, such as unauthorized users creating access keys to maintain persistence or exfiltrate data. The detection query specifically identifies instances when a user creates an IAM access key for another user, potentially indicating privilege escalation—a critical concern in the AWS environment. The query is designed for manual execution in threat hunting scenarios, allowing analysts to detect suspicious activities surrounding access key creation, particularly when these actions deviate from normal user behavior or are performed by users without a history of such actions.
Categories
- Cloud
- AWS
- Identity Management
Data Sources
- Cloud Service
ATT&CK Techniques
- T1078
Created: 2024-11-14