---
title: The AWS managed policy AWSCompromisedKeyQuarantine has been attached
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > OOTB Rules > The AWS managed policy
  AWSCompromisedKeyQuarantine has been attached
---

# The AWS managed policy AWSCompromisedKeyQuarantine has been attached
Classification:attackTactic:[TA0001-initial-access](https://attack.mitre.org/tactics/TA0001)Technique:[T1078-valid-accounts](https://attack.mitre.org/techniques/T1078) 
## Goal{% #goal %}

Detect when the AWS managed policy [AWSCompromisedKeyQuarantine](https://docs.aws.amazon.com/aws-managed-policy/latest/reference/AWSCompromisedKeyQuarantineV3.html) has been attached to a user, role, or group.

## Strategy{% #strategy %}

This rule monitors AWS CloudTrail and detects when the AWS managed policy AWSCompromisedKeyQuarantine has been attached to a user, role, or group. It is applied by the AWS team in the event that an IAM user's credentials has been compromised or publicly exposed.

## Triage and response{% #triage-and-response %}

1. An AWS support case has been opened regarding this event and contains instructions for investigation.
1. Investigate any other actions carried out by the compromised identity `{{@userIdentity.arn}}` using the Cloud SIEM investigator.

## Changelog{% #changelog %}

12 June 2025 - Update title and link to align with the latest `AWSCompromisedKeyQuarantineV3` managed policy.
