Skip to content

Commit e888d29

Browse files
updated notes
1 parent edeefe6 commit e888d29

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

hunting/aws/queries/iam_customer_managed_policies_attached_to_existing_roles.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ name = "AWS IAM Customer-Managed Policy Attachment for Privilege Escalation"
99
language = ["ES|QL"]
1010
license = "Elastic License v2"
1111
notes = [
12-
"Review the `target_account_id` field to verify the AWS account in which the role is being modified, especially if this account is outside of your organization’s typical accounts.",
13-
"Examine `aws.cloudtrail.request_parameters` for details on the role and attached policy. Customer-managed policies granting overly permissive access, such as `AdministratorAccess`, may signal unauthorized privilege escalation.",
14-
"Cross-reference `event.action` values where `AttachRolePolicy` appears to further investigate attached policies that could enable lateral movement or persistence.",
15-
"Evaluate `aws.cloudtrail.user_identity.arn` to confirm if the actor attaching the policy has legitimate permissions for this action. Anomalous or unauthorized actors may indicate privilege abuse.",
16-
"Look for patterns of multiple `AttachRolePolicy` actions across roles by the same user or entity. High frequency of these actions could suggest an attempt to establish persistent control across roles within your AWS environment."
12+
"Review the `attached_policy_name` and `target_role_name` fields to identify the customer-managed policy and role involved in the attachment.",
13+
"Review the permissions of the attached policy to determine the potential impact of the privilege escalation attempt.",
14+
"Review all entities that `target_role_name` may be attached to as these entities may have been compromised or misused.",
15+
"Consider reviewing the `aws.cloudtrail.user_identity.arn` field to identify the actor responsible for the privilege escalation attempt.",
16+
"Review the user agent of the actor to determine the source of the privilege escalation attempt, such as an AWS CLI or SDK.",
1717
]
1818
mitre = ['T1548.005']
1919
query = [

0 commit comments

Comments
 (0)