The AWS managed policy AWSCompromisedKeyQuarantine has been attached

Esta página aún no está disponible en español. Estamos trabajando en su traducción.
Si tienes alguna pregunta o comentario sobre nuestro actual proyecto de traducción, no dudes en ponerte en contacto con nosotros.

Goal

Detect when the AWS managed policy AWSCompromisedKeyQuarantine has been attached to a user, role, or group.

Strategy

This rule monitors AWS CloudTrail and detects when the AWS managed policy AWSCompromisedKeyQuarantine has been attached to a user, role, or group. It is applied by the AWS team in the event that an IAM user’s credentials has been compromised or publicly exposed.

Triage and response

  1. An AWS support case has been opened regarding this event and contains instructions for investigation.
  2. Investigate any other actions carried out by the compromised identity {{@userIdentity.arn}} using the Cloud SIEM investigator.

Changelog

12 June 2025 - Update title and link to align with the latest AWSCompromisedKeyQuarantineV3 managed policy.