< Back to rules searchAWS IAM user changing sensitive configurations
Overview
Goal
Detect when an AWS IAM user is changing sensitive configurations and has no prior history of invoking these APIs.
Strategy
This rule lets you monitor these GuardDuty integration findings:
Triage & Response
- Determine which user triggered the signal. This can be found in the signal.
- Determine if the user’s credentials are compromised.
- If the user’s credentials are compromised:
- Review the AWS documentation on remediating compromised AWS credentials.