Skip to content

Commit cc70d0c

Browse files
adding false-positive note
1 parent b642a43 commit cc70d0c

File tree

1 file changed

+19
-7
lines changed

1 file changed

+19
-7
lines changed

rules/integrations/aws/persistence_iam_create_user_via_assumed_role_and_cli.toml

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,25 @@ updated_date = "2024/11/04"
77
[rule]
88
author = ["Elastic"]
99
description = """
10-
Detects the creation of an AWS Identity and Access Management (IAM) user initiated by an assumed role on an EC2 instance. Assumed roles allow users or services to temporarily adopt different AWS permissions, but the creation of IAM users through these roles—particularly from within EC2 instances—may indicate a compromised instance. Adversaries might exploit such permissions to establish persistence by creating new IAM users under unauthorized conditions.
10+
Detects the creation of an AWS Identity and Access Management (IAM) user initiated by an assumed role on an EC2
11+
instance. Assumed roles allow users or services to temporarily adopt different AWS permissions, but the creation of IAM
12+
users through these roles—particularly from within EC2 instances—may indicate a compromised instance. Adversaries might
13+
exploit such permissions to establish persistence by creating new IAM users under unauthorized conditions.
1114
"""
15+
false_positives = [
16+
"""
17+
Assumed roles may be used by legitimate automated systems to create IAM users for specific workflows. Verify if this
18+
event aligns with known automation activities. If the action is routine for specific roles or user agents (e.g.,
19+
`aws-cli`, `boto3`), consider adding those roles or user agents to a monitored exception list for streamlined
20+
review.
21+
""",
22+
]
1223
from = "now-9m"
1324
index = ["filebeat-*", "logs-aws.cloudtrail-*"]
1425
language = "kuery"
1526
license = "Elastic License v2"
16-
name = "AWS IAM Create User via Assumed Role and CLI"
17-
note = """
18-
## Triage and Analysis
27+
name = "AWS IAM Create User via Assumed Role on EC2 Instance"
28+
note = """## Triage and Analysis
1929
2030
### Investigating AWS IAM User Creation via Assumed Role on an EC2 Instance
2131
@@ -61,7 +71,7 @@ For further guidance on managing IAM roles and permissions within AWS environmen
6171
"""
6272
references = [
6373
"https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreateUser.html",
64-
"https://www.dionach.com/en-us/breaking-into-the-cloud-red-team-tactics-for-aws-compromise/"
74+
"https://www.dionach.com/en-us/breaking-into-the-cloud-red-team-tactics-for-aws-compromise/",
6575
]
6676
risk_score = 47
6777
rule_id = "f7a1c536-9ac0-11ef-9911-f661ea17fbcd"
@@ -74,8 +84,9 @@ tags = [
7484
"Use Case: Identity and Access Audit",
7585
"Tactic: Persistence",
7686
]
77-
type = "new_terms"
7887
timestamp_override = "event.ingested"
88+
type = "new_terms"
89+
7990
query = '''
8091
event.dataset: "aws.cloudtrail"
8192
and event.action: "CreateUser"
@@ -103,10 +114,11 @@ id = "TA0003"
103114
name = "Persistence"
104115
reference = "https://attack.mitre.org/tactics/TA0003/"
105116

106-
107117
[rule.new_terms]
108118
field = "new_terms_fields"
109119
value = ["aws.cloudtrail.user_identity.arn"]
110120
[[rule.new_terms.history_window_start]]
111121
field = "history_window_start"
112122
value = "now-14d"
123+
124+

0 commit comments

Comments
 (0)