<  Back to rules search

AWS root account activity

cloudtrail

Classification:

attack

Tactic:

Technique:

Framework:

cis-aws

Control:

3.2

Goal

Detect AWS root user activity.

Strategy

Monitor CloudTrail and detect when any @userIdentity.type has a value of Root, but is not invoked by an AWS service or SAML provider.

Triage and response

  1. Reach out to the user to determine if the login was legitimate.
  2. If the login wasn’t legitimate, rotate the credentials, enable 2FA, and open an investigation.

Changelog

  • 30 March 2022 - Updated query and signal message.
  • 14 November 2022 - Updated options.