AWS IAM AdministratorAccess policy was applied to a user

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

Goal

Detect when the AdministratorAccess policy is attached to an AWS IAM user.

Strategy

This rule allows you to monitor CloudTrail and detect if an attacker has attached the AWS managed policy AdministratorAccess to an AWS IAM user using the AttachUserPolicy API call.

Triage and response

  1. Determine if {{@userIdentity.session_name}} should have made a {{@evt.name}} API call.
  2. If the API call was not made by the user:
  • Rotate user credentials.
  • Determine what other API calls were made by the user.
  • Remove the AdministratorAccess policy from the {{@requestParameters.userName}} user using the aws-cli command detach-user-policy.
  1. If the API call was made legitimately by the user:
  • Determine if the user {{@requestParameters.userName}} requires the AdministratorAccess policy to perform the intended function.
  • Advise the user to find the least privileged policy that allows the user to operate as intended.