forked from splunk/security_content
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathaws_iam_privilege_escalation.yml
33 lines (32 loc) · 1.63 KB
/
aws_iam_privilege_escalation.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
name: AWS IAM Privilege Escalation
id: ced74200-8465-4bc3-bd2c-22782eec6750
version: 1
date: '2021-03-08'
author: Bhavin Patel, Splunk
description: This analytic story contains detections that query your AWS Cloudtrail
for activities related to privilege escalation.
narrative: 'Amazon Web Services provides a neat feature called Identity and Access
Management (IAM) that enables organizations to manage various AWS services and resources
in a secure way. All IAM users have roles, groups and policies associated with them
which governs and sets permissions to allow a user to access specific restrictions.\
However, if these IAM policies are misconfigured and have specific combinations
of weak permissions; it can allow attackers to escalate their privileges and further
compromise the organization. Rhino Security Labs have published comprehensive blogs
detailing various AWS Escalation methods. By using this as an inspiration, Splunks
research team wants to highlight how these attack vectors look in AWS Cloudtrail
logs and provide you with detection queries to uncover these potentially malicious
events via this Analytic Story. '
references:
- https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/
- https://www.cyberark.com/resources/threat-research-blog/the-cloud-shadow-admin-threat-10-permissions-to-protect
- https://labs.bishopfox.com/tech-blog/privilege-escalation-in-aws
tags:
analytic_story: AWS IAM Privilege Escalation
category:
- Cloud Security
product:
- Splunk Security Analytics for AWS
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
usecase: Security Monitoring