heroui logo

AWS User Login Profile Was Modified

Sigma Rules

View Source
Summary
This detection rule monitors changes to AWS user login profiles by identifying when the `UpdateLoginProfile` event is triggered in CloudTrail logs. It highlights the potential for privilege escalation or unauthorized access to accounts, as an attacker with the appropriate permissions can reset passwords for any user with an existing login profile. The rule specifically looks for events where the event source is `iam.amazonaws.com` and ensures that the user making the change is not the same as the user whose profile is being modified. A legitimate scenario may involve account administration tasks, thus false positives are possible when normal user account roles are performing their maintenance duties.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Application Log
Created: 2021-08-09