
Summary
This detection rule monitors AWS CloudTrail logs for `AccountPasswordPolicy` events. It is particularly focused on identifying potential reconnaissance attempts for password policies when multiple such events are triggered from the same Amazon Resource Name (ARN) in a specified short time frame. The detection is characterized by a threshold set to recognize two occurrences within a deduplication period of 30 minutes. The rule is primarily enabled for detecting password policy discovery, which may indicate a probing activity by malicious entities aiming to assess the security posture of AWS accounts. This approach integrates reference parameters from the AWS IAM user guide to validate the expected results of AWS API calls related to password policies. Detected anomalies are crucial for cybersecurity awareness regarding potential misconfigurations or unauthorized policy disclosures in an AWS environment.
Categories
- Cloud
- AWS
- Identity Management
Data Sources
- Cloud Service
- Logon Session
- Cloud Storage
ATT&CK Techniques
- T1201
Created: 2023-11-06