Analytics Story: AWS IAM Privilege Escalation
Description
This analytic story contains detections that query your AWS Cloudtrail for activities related to privilege escalation.
Why it matters
Amazon Web Services provides a neat feature called Identity and Access Management (IAM) that enables organizations to manage various AWS services and resources in a secure way. All IAM users have roles, groups and policies associated with them which governs and sets permissions to allow a user to access specific restrictions. However, if these IAM policies are misconfigured and have specific combinations of weak permissions; it can allow attackers to escalate their privileges and further compromise the organization. Rhino Security Labs have published comprehensive blogs detailing various AWS Escalation methods. By using this as an inspiration, Splunks research team wants to highlight how these attack vectors look in AWS Cloudtrail logs and provide you with detection queries to uncover these potentially malicious events via this Analytic Story.
Detections
Data Sources
Name | Platform | Sourcetype | Source |
---|---|---|---|
AWS CloudTrail | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail ConsoleLogin | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail CreateAccessKey | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail CreateLoginProfile | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail CreatePolicyVersion | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail DeleteAccountPasswordPolicy | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail DeleteGroup | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail DeletePolicy | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail GetAccountPasswordPolicy | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail SetDefaultPolicyVersion | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail UpdateAccountPasswordPolicy | AWS | aws:cloudtrail |
aws_cloudtrail |
AWS CloudTrail UpdateLoginProfile | AWS | aws:cloudtrail |
aws_cloudtrail |
References
- https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/
- https://www.cyberark.com/resources/threat-research-blog/the-cloud-shadow-admin-threat-10-permissions-to-protect
- https://labs.bishopfox.com/tech-blog/privilege-escalation-in-aws
Source: GitHub | Version: 2