You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Rule Tuning] AWS STS AssumeRole with New MFA Device (#4999)
* [Rule Tuning] AWS STS AssumeRole with New MFA Device
This rule is triggering as expected and low volume of alerts in telemetry. This tuning:
- slight edits to IG
- removed user.id wildcard usage in query as this field always exists for these events
- added the from and interval fields for consistency across rules (they are currently using the same values by default so no real change here)
* adding investigation fields
adding investigation fields
Copy file name to clipboardExpand all lines: rules/integrations/aws/persistence_sts_assume_role_with_new_mfa.toml
+25-6Lines changed: 25 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
creation_date = "2024/10/25"
3
3
integration = ["aws"]
4
4
maturity = "production"
5
-
updated_date = "2025/01/15"
5
+
updated_date = "2025/08/20"
6
6
7
7
8
8
[rule]
@@ -14,7 +14,9 @@ While a new MFA device is not always indicative of malicious behavior it should
14
14
false_positives = [
15
15
"AWS administrators or automated processes might regularly assume roles for legitimate administrative purposes and to perform periodic tasks such as data backups, updates, or deployments.",
16
16
]
17
+
from = "now-6m"
17
18
index = ["filebeat-*", "logs-aws.cloudtrail-*"]
19
+
interval = "5m"
18
20
language = "kuery"
19
21
license = "Elastic License v2"
20
22
name = "AWS STS AssumeRole with New MFA Device"
@@ -29,10 +31,10 @@ AWS Security Token Service (STS) allows users to assume roles and gain temporary
29
31
30
32
### Possible investigation steps
31
33
32
-
- Review the event details in AWS CloudTrail to identify the user who assumed the role, focusing on the user.id field to determine if the user is legitimate and authorized to use the new MFA device.
33
-
- Check the serialNumber in the aws.cloudtrail.flattened.request_parameters to verify the registration and legitimacy of the new MFA device associated with the role assumption.
34
-
- Investigate the context of the AssumeRole action by examining the event.action field to understand if it was part of a legitimate workflow or an unusual activity.
35
-
- Analyze the event.outcome field to confirm the success of the role assumption and cross-reference with any recent changes in user permissions or MFA device registrations.
34
+
- Review the event details in AWS CloudTrail to identify the user who assumed the role, focusing on the `user.id` or `aws.cloudtrail.user_identity.arn` field to determine if the user is legitimate and authorized to use the new MFA device.
35
+
- Check the serialNumber in `aws.cloudtrail.request_parameters` to verify the registration and legitimacy of the new MFA device associated with the role assumption.
36
+
- Investigate the context of the AssumeRole action by examining surrounding events to understand if it was part of a legitimate workflow or an unusual activity.
37
+
- Cross-reference with any recent changes in user permissions or MFA device registrations.
36
38
- Correlate the event with other logs or alerts to identify any patterns of suspicious behavior, such as multiple role assumptions or changes in MFA devices within a short timeframe.
37
39
- Contact the user or relevant team to confirm if the new MFA device registration and role assumption were expected and authorized.
38
40
@@ -83,10 +85,27 @@ event.dataset:aws.cloudtrail
83
85
and event.provider:sts.amazonaws.com
84
86
and event.action:(AssumeRole or AssumeRoleWithSAML or AssumeRoleWithWebIdentity)
85
87
and event.outcome:success
86
-
and user.id:*
87
88
and aws.cloudtrail.flattened.request_parameters.serialNumber:*
0 commit comments