LoFP LoFP / automated processes that uses terraform may lead to false positives.

Techniques

Sample rules

AWS Suspicious SAML Activity

Description

Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.

Detection logic

condition: 1 of selection_*
selection_iam:
  eventName: UpdateSAMLProvider
  eventSource: iam.amazonaws.com
selection_sts:
  eventName: AssumeRoleWithSAML
  eventSource: sts.amazonaws.com

AWS STS AssumeRole Misuse

Description

Identifies the suspicious use of AssumeRole. Attackers could move laterally and escalate privileges.

Detection logic

condition: selection
selection:
  userIdentity.sessionContext.sessionIssuer.type: Role
  userIdentity.type: AssumedRole