AdministratorAccess Policy Attached to Group

Last updated on:

About the rule

Rule Type

Standard

Rule Description

An adversary with access to a set of compromised credentials may attempt to persist or escalate privileges by attaching additional permissions to user groups the compromised user account belongs to. This rule looks for use of the IAMAttachGroupPolicyAPI operation to attach the highly permissiveAdministratorAccessAWS managed policy to an existing IAM user group.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "DETECTION_ACTION_AWS_POLICY_ATTACHED_TO_GROUP" AND (POLICY_NAME = "AdministratorAccess") select Action1.CALLER,Action1.HOSTNAME,Action1.IPADDRESS,Action1.LOG_EVENT_NAME,Action1.POLICY_NAME,Action1.SOURCE,Action1.SOURCE_REGION,Action1.REQUESTPARAMETERS

Detection

Execution Mode

realtime

Log Sources

AWS