
Summary
The rule detects potential privilege escalation or persistence activities in AWS by monitoring the use of the IAM CreateAccessKey API operation. This API allows the creation of new access keys for users, and when this action involves a case where the user creating the keys (user.name) differs from the target user (user.target.name), it indicates a potentially malicious action, such as an attacker using compromised credentials. The rule leverages Elasticsearch's ESQL to query AWS CloudTrail logs for successful CreateAccessKey operations, focusing on anomalies in actions that could suggest account manipulation. Key investigation steps include reviewing IAM policies, analyzing user behavior for abnormal patterns, and confirming actions with account owners. False positives are acknowledged due to legitimate use cases of CreateAccessKey, requiring verification against expected user permission levels.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- User Account
- Application Log
ATT&CK Techniques
- T1098
- T1098.001
Created: 2024-06-13