Techniques
Sample rules
AWS STS GetSessionToken Misuse
- source: sigma
- technicques:
- t1548
- t1550
- t1550.001
Description
Identifies the suspicious use of GetSessionToken. Tokens could be created and used by attackers to move laterally and escalate privileges.
Detection logic
condition: selection
selection:
eventName: GetSessionToken
eventSource: sts.amazonaws.com
userIdentity.type: IAMUser