AdministratorAccess Policy Attached to Group
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
An adversary with access to a set of compromised credentials may attempt to persist or escalate privileges by attaching additional permissions to user groups the compromised user account belongs to. This rule looks for use of the IAMAttachGroupPolicyAPI operation to attach the highly permissiveAdministratorAccessAWS managed policy to an existing IAM user group.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_AWS_POLICY_ATTACHED_TO_GROUP" AND (POLICY_NAME = "AdministratorAccess") select Action1.CALLER,Action1.HOSTNAME,Action1.IPADDRESS,Action1.LOG_EVENT_NAME,Action1.POLICY_NAME,Action1.SOURCE,Action1.SOURCE_REGION,Action1.REQUESTPARAMETERS
Detection
Execution Mode
realtime
Log Sources
AWS


