AdministratorAccess Policy Attached to User
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
An adversary with access to a set of compromised credentials may attempt to persist or escalate privileges by attaching additional permissions to compromised user accounts. This rule looks for use of the IAMAttachUserPolicyAPI operation to attach the highly permissiveAdministratorAccessAWS managed policy to an existing IAM user.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_AWS_POLICY_ATTACHED_TO_USER" AND (POLICY_NAME = "AdministratorAccess") select Action1.CALLER,Action1.HOSTNAME,Action1.IPADDRESS,Action1.LOG_EVENT_NAME,Action1.POLICY_NAME,Action1.USERNAME,Action1.SOURCE,Action1.SOURCE_REGION,Action1.REQUESTPARAMETERS
Detection
Execution Mode
realtime
Log Sources
AWS


