AWS Console brute force login
Incident Management is now generally available! Incident Management is now generally available!
<  Back to rules search

AWS Console brute force login

cloudtrail

Classification:

compliance

Framework:

cis-aws

Control:

cis-3.6

Overview

Goal

Detect when a user is a victim of an Account Take Over (ATO) by a brute force attack.

Strategy

This rule monitors CloudTrail and detects when any @evt.name has a value of Console Login, and @responseElements.ConsoleLogin has a value of Failure.

Triage & Response

  1. Determine if the user logged in with 2FA.
  2. Reach out to the user and ensure the login was legitimate.