heroui logo

AWS High Number Of Failed Authentications For User

Splunk Security Content

View Source
Summary
The detection rule "AWS High Number Of Failed Authentications For User" is designed to analyze failed authentication attempts for AWS accounts using AWS CloudTrail logs. It triggers when there are more than 20 failed ConsoleLogin events within a 5-minute window, suggesting the possibility of a brute force attack targeting the AWS account. This threshold is adjustable depending on the organization’s specific environment to minimize false positives. By monitoring failed login attempts, this rule aids security teams in identifying potential unauthorized access attempts that could lead to data breaches or further exploitation of resources in the AWS environment. Careful consideration should be given to the context of the alerts, as legitimate reasons, such as broken applications, can also cause multiple failed authentications.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
ATT&CK Techniques
  • T1201
  • T1110.003
Created: 2024-11-14