AWS Console Brute Force Login
Security Monitoring is now available Security Monitoring is now available
<  Back to rules search

AWS Console Brute Force Login

cloudtrail

Classification:

compliance

Framework:

cis

Control:

cis-3.6

Set up the cloudtrail integration.

Overview

Goal

Detect when a user is a victim of an Account Take Over (ATO) by a brute force attack.

Strategy

This rule monitors CloudTrail and detects when any @evt.name has a value of Console Login, and @error.message: has a value of Failed authentication.

Triage & Response

  1. Determine if the user logged in with 2FA.
  2. Reach out to the user and ensure the login was legitimate.