Techniques
Sample rules
AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts
- source: elastic
- technicques:
- T1078
- T1552
Description
Correlates open detection alerts that share the same long-term IAM access key ID ( prefix AKIA). It fires when the rule AWS Long-Term Access Key First Seen from Source IP (rule_id: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) has triggered for that key and at least one other open alert for the same key is medium, high, or critical severity. This higher-order rule helps prioritize long-term key novelty when it co-occurs with elevated detections that may indicate post-compromise activity.
Detection logic
from .alerts-security.* METADATA _id, _version, _index
// Sibling rule: AWS Long-Term Access Key First Seen from Source IP
// rule_id = 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f
| where kibana.alert.workflow_status == "open"
and event.kind == "signal"
and source.ip is not null
and kibana.alert.rule.name is not null
and not kibana.alert.rule.type in ("threat_match", "machine_learning")
and not kibana.alert.rule.name like "Deprecated - *"
and not KQL("""kibana.alert.rule.tags : "Rule Type: Higher-Order Rule" """)
and (
kibana.alert.rule.rule_id == "9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f"
or kibana.alert.risk_score >= 47
or kibana.alert.severity in ("medium", "high", "critical")
)
| eval Esql.is_long_term_key_new_ip_rule = kibana.alert.rule.rule_id == "9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f"
| eval Esql.is_other_elevated_rule = kibana.alert.rule.rule_id != "9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f"
and (
kibana.alert.risk_score >= 47
or kibana.alert.severity in ("medium", "high", "critical")
)
| stats
Esql.alert_count_long_term_key_new_ip_rule = SUM(CASE(Esql.is_long_term_key_new_ip_rule, 1, 0)),
Esql.alert_count_other_elevated_rule = SUM(CASE(Esql.is_other_elevated_rule, 1, 0)),
Esql.kibana_alert_rule_name_values = VALUES(kibana.alert.rule.name),
Esql.kibana_alert_rule_id_values = VALUES(kibana.alert.rule.rule_id),
Esql.kibana_alert_risk_score_values = VALUES(kibana.alert.risk_score),
Esql.kibana_alert_severity_values = VALUES(kibana.alert.severity),
Esql.user_entity_id_values = VALUES(user.entity.id),
Esql.timestamp_min = MIN(@timestamp),
Esql.timestamp_max = MAX(@timestamp)
by source.ip
| where Esql.alert_count_long_term_key_new_ip_rule > 0
and Esql.alert_count_other_elevated_rule > 0
| keep
source.ip,
Esql.alert_count_long_term_key_new_ip_rule,
Esql.alert_count_other_elevated_rule,
Esql.kibana_alert_rule_name_values,
Esql.kibana_alert_rule_id_values,
Esql.kibana_alert_risk_score_values,
Esql.kibana_alert_severity_values,
Esql.user_entity_id_values,
Esql.timestamp_min,
Esql.timestamp_max