AWS IAM user suspicious login
Incident Management is now generally available! Incident Management is now generally available!
<  Back to rules search

AWS IAM user suspicious login

guardduty

Classification:

anomaly

Overview

Goal

Detect when an AWS IAM user login is suspicious.

Strategy

This rule lets you monitor these GuardDuty integration findings:

Triage & Response

  1. Determine which user triggered the signal. This can be found in the signal.
  2. Determine if the user’s credentials are compromised.
  3. If the user’s credentials are compromised:
  • Review the AWS documentation on remediating compromised AWS credentials.