
Summary
This detection rule monitors root account activities in AWS CloudTrail logs. Root accounts possess the highest level of privileges and any actions taken by them pose significant security risks. The rule is triggered when any activity from a root account is detected. This includes actions like creating service-linked roles, changes to S3 bucket settings, and any successful login events. The rule employs tests to ensure that unexpected actions, particularly unauthorized root access, are flagged for review. Investigative actions include verifying the legitimacy of the activity, altering root credentials if the activity is unauthorized, and reviewing the impact of the changes made by the root account. The rule focuses on ensuring that any root account misuse is detected promptly, hence protecting the overall AWS environment from potential privilege escalation and misuse.
Categories
- Cloud
- Identity Management
Data Sources
- Cloud Storage
- Logon Session
ATT&CK Techniques
- T1078
Created: 2022-09-02