AWS Suspicious SAML Activity
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_AWS_SUSPICIOUS_SAML_ACTIVITY_DETECTED" select Action1.CALLER,Action1.HOSTNAME,Action1.IPADDRESS,Action1.LOG_EVENT_NAME,Action1.SOURCE,Action1.SOURCE_REGION,Action1.REQUESTPARAMETERS
Detection
Execution Mode
realtime
Log Sources
AWS
Author
Austin Songer


