AWS IAM User Escalating Privileges
Security Monitoring is now available Security Monitoring is now available
<  Back to rules search

AWS IAM User Escalating Privileges

guardduty

Classification:

attack

Tactic:

Set up the guardduty integration.

Overview

Goal

Detect when an AWS IAM user is attempting to escalate permissions.

Strategy

This rule lets you monitor this GuardDuty integration finding:

Triage & Response

  1. Determine which user triggered the signal. This can be found in the signal.
  2. Determine if the user’s credentials are compromised.
  3. If the user’s credentials are compromised:
    • Review the AWS [documentation][3] on remediating compromised AWS credentials.