Skip to content

Commit 8e5a44b

Browse files
authored
Update rules/integrations/aws/privilege_escalation_role_assumption_by_service.toml
1 parent 5a33d72 commit 8e5a44b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

rules/integrations/aws/privilege_escalation_role_assumption_by_service.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ license = "Elastic License v2"
2727
name = "AWS STS Role Assumption by Service"
2828
note = """## Triage and Analysis
2929
30-
### Investigating AWS STS Role Assumption for Service
30+
### Investigating AWS STS Role Assumption by Service
3131
3232
This rule identifies instances where AWS STS (Security Token Service) is used to assume a role, granting temporary credentials for AWS resource access. While this action is often legitimate, it can be exploited by adversaries to obtain unauthorized access, escalate privileges, or move laterally within an AWS environment.
3333

0 commit comments

Comments
 (0)