AdministratorAccess Policy Attached to Role

Last updated on:

About the rule

Rule Type

Standard

Rule Description

An adversary with access to a set of compromised credentials may attempt to persist or escalate privileges by attaching additional permissions to compromised IAM roles. This rule looks for use of the IAMAttachRolePolicyAPI operation to attach the highly permissiveAdministratorAccessAWS managed policy to an existing IAM role.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "DETECTION_ACTION_AWS_POLICY_ATTACHED_TO_ROLE" AND (POLICY_NAME = "AdministratorAccess") select Action1.CALLER,Action1.HOSTNAME,Action1.IPADDRESS,Action1.LOG_EVENT_NAME,Action1.POLICY_NAME,Action1.SOURCE,Action1.SOURCE_REGION,Action1.REQUESTPARAMETERS

Detection

Execution Mode

realtime

Log Sources

AWS