You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* [Rule Tuning][Deprecation] AWS Root Console Login Rules
Deprecate - AWS Root Login Without MFA
- Starting deprecation process for this rule. While root login without MFA should certainly be investigated, this rule overlaps with the broader AWS Successful Root Console login rule. Between the 2, the broader rule should remain since all succesful Root console login events should be investigated. Part of the investigation can include determining if MFA was or was not enabled.
Tuning - AWS Management Console Root Login
No major rule changes needed, telemetry is low as expected for this rule
- reduced execution window
- updated investigation guide
- adjusted tags
- added highlighted fields
- added Mitre subtechnique
Tuning - AWS Management Console Brute Force of Root User Identity
No major rule changes needed, telemetry is low as expected for this rule
- reduced execution window
- updated investigation guide
- adjusted tags
- added highlighted field (the only one available for threshold rule is the threshold field)
* adding AWS Sign-In tag
adding AWS Sign-In tag
Copy file name to clipboardExpand all lines: rules/integrations/aws/credential_access_root_console_failure_brute_force.toml
+79-26Lines changed: 79 additions & 26 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
creation_date = "2020/07/21"
3
3
integration = ["aws"]
4
4
maturity = "production"
5
-
updated_date = "2025/01/15"
5
+
updated_date = "2025/10/10"
6
6
7
7
[rule]
8
8
author = ["Elastic"]
@@ -17,7 +17,7 @@ false_positives = [
17
17
positives.
18
18
""",
19
19
]
20
-
from = "now-20m"
20
+
from = "now-6m"
21
21
index = ["filebeat-*", "logs-aws.cloudtrail-*"]
22
22
language = "kuery"
23
23
license = "Elastic License v2"
@@ -29,37 +29,81 @@ note = """## Triage and analysis
29
29
30
30
### Investigating AWS Management Console Brute Force of Root User Identity
31
31
32
-
The AWS Management Console is a web-based interface for accessing and managing AWS services. The root user identity has unrestricted access, making it a prime target for adversaries seeking unauthorized control. Attackers may attempt brute force attacks to guess the root password. The detection rule identifies such attempts by monitoring failed login events specifically for the root user, flagging potential credential access threats.
32
+
The AWS Management Console provides a web interface for managing AWS resources. Because the root user has unrestricted privileges, repeated failed console login attempts targeting this identity represent a high-risk credential access event. Even if no login succeeded, this activity may indicate reconnaissance, password spraying, or credential stuffing attempts targeting the root user.
33
33
34
-
### Possible investigation steps
34
+
This rule uses a threshold rule that detects a high number of failed `ConsoleLogin` events (`event.outcom: failure` with `userIdentity.type: Root`) within a short timeframe from the same IP address or user agent.
35
+
Threshold rules only summarize grouped field values, so analysts must use timeline to review the actual events that triggered the alert.
35
36
36
-
- Review the CloudTrail logs for the specific time frame of the failed login attempts to identify patterns or anomalies in the source IP addresses or user agents.
37
-
- Check the geographical location of the IP addresses involved in the failed login attempts to determine if they are consistent with known or expected locations for legitimate access.
38
-
- Investigate any successful login attempts from the same IP addresses or user agents to assess if the brute force attempt was successful at any point.
39
-
- Analyze the frequency and timing of the failed login attempts to determine if they align with typical brute force attack patterns, such as rapid or sequential attempts.
40
-
- Correlate the failed login events with other security events or alerts in the AWS environment to identify any concurrent suspicious activities that may indicate a broader attack campaign.
41
-
- Review AWS CloudTrail logs for any changes in IAM policies or unusual activity following the failed login attempts to ensure no unauthorized access was gained.
37
+
#### Possible investigation steps
42
38
43
-
### False positive analysis
39
+
- **Review in Timeline.**
40
+
Open the alert and *Investigate in timeline* to view the individual CloudTrail events contributing to the threshold alert. Review:
41
+
- `source.ip`, `user_agent.original`, `geo fields` and `@timestamp` for each failure.
42
+
- Look for patterns such as distributed sources or repeated retries at consistent intervals.
43
+
- Look for any corresponding successful `ConsoleLogin` events around the same timeframe from the same IP or agent.
44
44
45
-
- Legitimate users may forget their password and repeatedly attempt to log in, triggering the rule. To manage this, monitor for patterns of failed logins followed by successful ones and consider excluding these from alerts if they originate from known IP addresses.
46
-
- Automated scripts or applications using outdated credentials can cause repeated failed login attempts. Identify and update these credentials or exclude the associated IP addresses from the rule.
47
-
- Security testing or penetration testing activities might simulate brute force attacks. Coordinate with your security team to whitelist IP addresses or timeframes associated with these activities to prevent false positives.
48
-
- Shared accounts or environments where multiple users attempt to access the root account can lead to multiple failed attempts. Implement stricter access controls and consider excluding known internal IP ranges from the rule.
45
+
- **Assess IP reputation and geolocation.**
46
+
Use IP intelligence tools to evaluate whether the source addresses belong to known cloud providers, TOR nodes, or foreign regions outside your normal operations.
47
+
- Correlate against `cloud.region` and `geo fields` and compare with expected login locations for your organization.
49
48
50
-
### Response and remediation
49
+
- **Check for related activity.**
50
+
Review CloudTrail for other API calls from the same source IP (for example, `GetSessionToken`, `AssumeRole`, or `ListUsers`) that may indicate scripted credential testing or discovery.
51
+
52
+
- **Correlate with GuardDuty findings.**
53
+
GuardDuty may raise complementary findings for anomalous console login behavior or brute force attempts. Review recent GuardDuty and AWS Config alerts for the same timeframe.
51
54
52
-
- Immediately disable the root user account to prevent further unauthorized access attempts. This can be done through the AWS Management Console by navigating to the IAM section and selecting the root user account.
53
-
- Review the CloudTrail logs to identify the source IP addresses of the failed login attempts. Block these IP addresses using AWS security groups or network ACLs to prevent further access attempts from these locations.
54
-
- Reset the root user password and ensure it is strong and unique. Use a password manager to generate and store the new password securely.
55
-
- Enable multi-factor authentication (MFA) for the root user account to add an additional layer of security. This can be configured in the AWS Management Console under the IAM section.
56
-
- Conduct a thorough audit of recent account activity to ensure no unauthorized changes have been made. Pay special attention to IAM roles, policies, and permissions.
57
-
- Notify the security team and relevant stakeholders about the incident for awareness and further investigation. Provide them with details of the attempted breach and actions taken.
58
-
- Implement additional monitoring and alerting for unusual login patterns or failed login attempts to the root account to enhance early detection of similar threats in the future.
55
+
- **Determine business context.**
56
+
Confirm whether the source IPs are internal (for example, corporate VPN, IT admin network) or part of legitimate red-team or third-party testing. If uncertain, treat as suspicious.
57
+
58
+
### False positive analysis
59
59
60
-
## Setup
60
+
- **Forgotten or mistyped credentials.**
61
+
Repeated failed logins from known internal IPs could indicate a legitimate user typing errors. Validate by checking if a successful root login followed soon after.
62
+
- **Automation or scanners.**
63
+
Misconfigured monitoring tools or old browser sessions attempting to reuse cached credentials may trigger this rule.
64
+
- **Planned penetration testing.**
65
+
Red-team or security testing activities can generate deliberate brute force attempts. Verify via ticketing or testing schedules.
61
66
62
-
The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
67
+
### Response and remediation
68
+
69
+
> The AWS Incident Response Playbooks classify root login attempts as Priority-1 credential compromise events.
70
+
> Follow these steps whether or not your organization has a formal IR team.
71
+
72
+
**1. Immediate containment**
73
+
- **Check for success.**
74
+
After pivoting to Timeline, confirm whether any `ConsoleLogin` events from the same IP or user agent show `event.oucome: success`.
75
+
- If a successful login occurred, immediately follow the *AWS Management Console Root Login* rule investigation guide.
76
+
- **Rotate the root password.**
77
+
Use AWS’s password reset function to set a strong, unique password stored in an offline vault.
78
+
- **Enable or verify Multi-Factor Authentication (MFA)** on the root account. If MFA was already configured, review the device registration for changes or suspicious resets.
79
+
- **Block offending IPs or networks.**
80
+
Use AWS WAF, VPC network ACLs, or Security Groups to temporarily block the IPs used in the failed attempts.
81
+
- **Alert internal teams.**
82
+
Notify your security operations or cloud governance teams of the brute force pattern and actions taken.
83
+
84
+
**2. Evidence preservation**
85
+
- Export all failed `ConsoleLogin` events visible in Timeline (±30 minutes around the alert window) to a restricted evidence bucket.
86
+
- Preserve GuardDuty findings, AWS Config history, and CloudTrail logs for the same timeframe for further analysis.
87
+
88
+
**3. Scoping and investigation**
89
+
- Query CloudTrail across other AWS accounts and regions for additional failed or successful `ConsoleLogin` events from the same IPs.
90
+
- Check IAM activity for simultaneous key creation, role modifications, or new users — signs of lateral or parallel intrusion attempts.
91
+
- Review network telemetry (VPC Flow Logs, CloudFront, WAF) to determine whether the activity originated from a distributed or scripted attack pattern.
92
+
93
+
**4. Recovery and hardening**
94
+
- Confirm MFA is enabled and enforced on the root account.
95
+
- Remove any root access keys (none should exist under normal security posture).
96
+
- Enable organization-wide CloudTrail, GuardDuty, and Security Hub across all regions.
97
+
- Set up real-time alerts for any future `ConsoleLogin` failures from the root user exceeding expected baselines.
98
+
- Store root credentials offline with dual-custody and document controlled access procedures.
99
+
100
+
### Additional information
101
+
102
+
- **[AWS IR Playbooks](https://github.com/aws-samples/aws-incident-response-playbooks/tree/c151b0dc091755fffd4d662a8f29e2f6794da52c/playbooks):** See “Credential Compromise” and “Account Compromise” for investigation, containment, and escalation guidance.
103
+
- **[AWS Customer Playbook Framework](https://github.com/aws-samples/aws-customer-playbook-framework/tree/a8c7b313636b406a375952ac00b2d68e89a991f2/docs):** Reference runbooks for failed-login response, evidence preservation, and MFA enforcement.
104
+
- **AWS Documentation:** [Tasks that require the root user](https://docs.aws.amazon.com/general/latest/gr/root-vs-iam.html#aws_tasks-that-require-root).
105
+
- **Security Best Practices:** [AWS Knowledge Center – Security Best Practices](https://aws.amazon.com/premiumsupport/knowledge-center/security-best-practices/).
event.dataset:aws.cloudtrail and event.provider:signin.amazonaws.com and event.action:ConsoleLogin and aws.cloudtrail.user_identity.type:Root and event.outcome:failure
0 commit comments