
Summary
This detection rule monitors for attempts to disable Multi-Factor Authentication (MFA) for AWS IAM users, a critical security mechanism against unauthorized access. It utilizes logs from Amazon Security Lake, specifically focusing on the API operations `DeleteVirtualMFADevice` and `DeactivateMFADevice`. Disabling MFA can indicate malicious activity, as attackers may seek to weaken account defenses to maintain access and potentially launch further attacks. Confirming a disabling action as malicious can signify that adversaries are attempting to gain undetected access to sensitive AWS resources, posing a substantial risk to AWS environments.
Categories
- Cloud
- AWS
Data Sources
- Pod
- Container
- Cloud Service
- Application Log
ATT&CK Techniques
- T1621
- T1586
- T1586.003
- T1556
- T1556.006
Created: 2024-11-14