heroui logo

ASL AWS Multi-Factor Authentication Disabled

Splunk Security Content

View Source
Summary
This detection rule monitors for attempts to disable Multi-Factor Authentication (MFA) for AWS IAM users, a critical security mechanism against unauthorized access. It utilizes logs from Amazon Security Lake, specifically focusing on the API operations `DeleteVirtualMFADevice` and `DeactivateMFADevice`. Disabling MFA can indicate malicious activity, as attackers may seek to weaken account defenses to maintain access and potentially launch further attacks. Confirming a disabling action as malicious can signify that adversaries are attempting to gain undetected access to sensitive AWS resources, posing a substantial risk to AWS environments.
Categories
  • Cloud
  • AWS
Data Sources
  • Pod
  • Container
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1621
  • T1586
  • T1586.003
  • T1556
  • T1556.006
Created: 2024-11-14