< Back to rules searchAWS IAM privileged policy was applied to a role
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detect when the AdministratorAccess
policy is attached to an AWS IAM role.
Strategy
This rule lets you monitor CloudTrail to detect if an attacker has attached the AWS managed policy AdministratorAccess
to a new AWS IAM role via the AttachRolePolicy
API call.
Triage and response
- Determine if
{{@userIdentity.session_name}}
should have made a {{@evt.name}}
API call. - If the API call was not made by the user:
- Rotate user credentials.
- Determine what other API calls were made by the user.
- Remove the
AdministratorAccess
policy from the {{@requestParameters.roleName}}
role using the aws-cli
command detach-role-policy.
- If the API call was made legitimately by the user:
- Determine if the role
{{@requestParameters.roleName}}
requires the AdministratorAccess policy to perform its intended function. - Advise the user to find the least privileged policy that allows the role to operate as intended.