heroui logo

aws detect permanent key creation

Splunk Security Content

View Source
Summary
The 'AWS Detect Permanent Key Creation' rule is designed to identify the creation of permanent access keys in AWS accounts. This detection is particularly vital as permanent keys provide programmatic access and, if misused, can allow attackers persistent access to AWS resources. The rule utilizes CloudWatch logs to monitor events where the 'CreateAccessKey' action is executed by IAM users. The ability to create permanent keys is not a default behavior, and thus identifying this activity can help in mitigating risks associated with unauthorized access and potential data exfiltration. The provided search query filters CloudWatch logs to extract relevant details about the key generation events, including the source IP address, username, and key creation date. As permanent access keys can be utilized for abusive activities if they fall into the wrong hands, continuous monitoring is essential for effective AWS security management. The rule currently holds an experimental status and requires specific setups, such as the installation of the Splunk AWS Add-on and Splunk App for AWS to function properly. It is also important to note that not all instances of permanent key creation are necessarily malicious, and practices such as key rotation may yield false positive alerts.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Application Log
ATT&CK Techniques
  • T1078
Created: 2024-11-14