AWS IAM Policy Changed
Dash が新機能を発表!インシデントマネジメント、Continuous Profiler など多数の機能が追加されました! Dash イベントで発表された新機能!
<  Back to rules search

AWS IAM Policy Changed

cloudtrail

Classification:

compliance

Framework:

cis-aws

Control:

cis-3.4

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Overview

Goal

Detect a change to an AWS IAM Policy.

Strategy

This rule lets you monitor CloudTrail and detect when any event pertaining to an AWS IAM policy is detected with one of the following API calls: * DeleteGroupPolicy * DeleteRolePolicy * DeleteUserPolicy * PutGroupPolicy * [PutRolePolicy] * PutUserPolicy * [CreatePolicy] * DeletePolicy * CreatePolicyVersion * DeletePolicyVersion * AttachRolePolicy * DetachRolePolicy * AttachUserPolicy * DetachUserPolicy * AttachGroupPolicy * DetachGroupPolicy

Triage & Response

  1. Review the IAM Policy change and ensure it does not negatively impact your risk in relation to authentication or authorization controls.