heroui logo

AWS Sensitive IAM Operations Performed via CloudShell

Elastic Detection Rules

View Source
Summary
This rule is designed to detect sensitive AWS Identity and Access Management (IAM) operations carried out via AWS CloudShell, which is a browser-based shell for accessing AWS resources seamlessly. By analyzing the user agent string in AWS CloudTrail logs, this rule highlights high-risk activities, including the creation of IAM users, access keys, roles, and policy attachments that may hint at compromised AWS console sessions. Attackers utilizing CloudShell can perform these operations without leaving traces on their local devices, making this rule crucial for monitoring potential post-compromise scenarios where they seek to escalate privileges or harvest credentials. The rule incorporates specific event actions, success outcomes, and requires a user agent indicative of CloudShell usage. It aims to help security teams respond rapidly to suspicious activities by identifying legitimate user identity and analyzing the context of the actions performed.
Categories
  • Cloud
  • AWS
  • Infrastructure
Data Sources
  • Cloud Service
  • Service
  • User Account
  • Network Traffic
ATT&CK Techniques
  • T1136
  • T1136.003
  • T1098
  • T1098.003
Created: 2026-02-10