heroui logo

AWS Compromised IAM Key Quarantine

Panther Rules

View Source
Summary
This rule is designed to monitor AWS CloudTrail logs to detect when an IAM user is assigned the 'AWSCompromisedKeyQuarantineV2' policy. This policy indicates a potential security issue where an IAM key may have been compromised. When this policy is attached, it suggests actions that need to be taken to remediate access risks. The initial check looks for the 'AttachUserPolicy' event confirming the attachment of the policy, while a secondary check ensures that no conflicting policies are applied that could potentially bypass lockdown measures in place. It draws upon MITRE ATT&CK tactics related to valid accounts and credential access, highlighting its relevance in identifying compromised credentials in AWS environments. An immediate next step involves checking the usage of the quarantined key for signs of misuse based on the procedures outlined in the AWS support documentation linked in the rule.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Storage
  • Application Log
ATT&CK Techniques
  • T1078.004
  • T1552.001
Created: 2023-11-27