heroui logo

AWS Detect Users creating keys with encrypt policy without MFA

Splunk Security Content

View Source
Summary
This detection rule is designed to identify when AWS KMS keys are created with an encryption policy that allows the `kms:Encrypt` action to be accessed by all principals, including external entities. It utilizes AWS CloudTrail logs to detect `CreateKey` and `PutKeyPolicy` events. The presence of such a broad encryption policy can signal potential account compromise, enabling attackers to misuse the encryption keys, which may affect other organizations. This can lead to unauthorized encryption of data, threatening operational continuity and sensitive information security across multiple entities. It's crucial to monitor and respond to such activities to mitigate risks associated with compromised AWS accounts.
Categories
  • Cloud
  • AWS
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1486
Created: 2024-11-14