You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/integrations/aws/persistence_iam_create_user_via_assumed_role_and_cli.toml
+19-7Lines changed: 19 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,25 @@ updated_date = "2024/11/04"
7
7
[rule]
8
8
author = ["Elastic"]
9
9
description = """
10
-
Detects the creation of an AWS Identity and Access Management (IAM) user initiated by an assumed role on an EC2 instance. Assumed roles allow users or services to temporarily adopt different AWS permissions, but the creation of IAM users through these roles—particularly from within EC2 instances—may indicate a compromised instance. Adversaries might exploit such permissions to establish persistence by creating new IAM users under unauthorized conditions.
10
+
Detects the creation of an AWS Identity and Access Management (IAM) user initiated by an assumed role on an EC2
11
+
instance. Assumed roles allow users or services to temporarily adopt different AWS permissions, but the creation of IAM
12
+
users through these roles—particularly from within EC2 instances—may indicate a compromised instance. Adversaries might
13
+
exploit such permissions to establish persistence by creating new IAM users under unauthorized conditions.
11
14
"""
15
+
false_positives = [
16
+
"""
17
+
Assumed roles may be used by legitimate automated systems to create IAM users for specific workflows. Verify if this
18
+
event aligns with known automation activities. If the action is routine for specific roles or user agents (e.g.,
19
+
`aws-cli`, `boto3`), consider adding those roles or user agents to a monitored exception list for streamlined
20
+
review.
21
+
""",
22
+
]
12
23
from = "now-9m"
13
24
index = ["filebeat-*", "logs-aws.cloudtrail-*"]
14
25
language = "kuery"
15
26
license = "Elastic License v2"
16
-
name = "AWS IAM Create User via Assumed Role and CLI"
17
-
note = """
18
-
## Triage and Analysis
27
+
name = "AWS IAM Create User via Assumed Role on EC2 Instance"
28
+
note = """## Triage and Analysis
19
29
20
30
### Investigating AWS IAM User Creation via Assumed Role on an EC2 Instance
21
31
@@ -61,7 +71,7 @@ For further guidance on managing IAM roles and permissions within AWS environmen
0 commit comments