AWS IAM AmazonSESFullAccess policy was applied to a group
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detect when the AmazonSESFullAccess
policy is attached to an AWS IAM group.
Strategy
This rule allows you to monitor CloudTrail and detect if an attacker has attached the AWS managed policy AmazonSESFullAccess
to an AWS IAM group using the AttachGroupPolicy
API call. An attacker with an objective of leveraging the AWS Simple Email Service (SES) may only attach a policy relating to SES to avoid detections relating to the AWS managed policy [AdministratorAccess
].
Triage and response
- Determine if
{{@userIdentity.session_name}}
should have made a {{@evt.name}}
API call. - If the API call was not made by the user:
- Rotate user credentials.
- Determine what other API calls were made by the user.
- Remove the
AmazonSESFullAccess
policy from the {{@requestParameters.groupName}}
group using the aws-cli
command detach-group-policy.
- If the API call was made legitimately by the user:
- Determine if the group
{{@requestParameters.groupName}}
requires the AmazonSESFullAccess
policy to perform the intended function. - Advise the user to find the least privileged policy that allows the group to operate as intended.