AWS SAML Activity

Identifies when SAML activity has occurred in AWS. An adversary could manipulate SAML to maintain access to the target.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2021/09/22"
 3integration = ["aws"]
 4maturity = "production"
 5updated_date = "2024/05/21"
 6
 7[rule]
 8author = ["Austin Songer"]
 9description = "Identifies when SAML activity has occurred in AWS. An adversary could manipulate SAML to maintain access to the target."
10false_positives = [
11    """
12    SAML Provider could be updated by a system administrator. Verify whether the user identity, user agent, and/or
13    hostname should be making changes in your environment. SAML Provider updates by unfamiliar users should be
14    investigated. If known behavior is causing false positives, it can be exempted from the rule.
15    """,
16]
17from = "now-25m"
18index = ["filebeat-*", "logs-aws.cloudtrail-*"]
19language = "kuery"
20license = "Elastic License v2"
21name = "AWS SAML Activity"
22note = """## Setup
23
24The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
25references = [
26    "https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateSAMLProvider.html",
27    "https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithSAML.html",
28]
29risk_score = 21
30rule_id = "979729e7-0c52-4c4c-b71e-88103304a79f"
31severity = "low"
32tags = [
33    "Domain: Cloud",
34    "Data Source: AWS",
35    "Data Source: Amazon Web Services",
36    "Use Case: Identity and Access Audit",
37    "Tactic: Defense Evasion",
38]
39timestamp_override = "event.ingested"
40type = "query"
41
42query = '''
43event.dataset:aws.cloudtrail and event.provider:(iam.amazonaws.com or sts.amazonaws.com) and event.action:(Assumerolewithsaml or
44UpdateSAMLProvider) and event.outcome:success
45'''
46
47
48[[rule.threat]]
49framework = "MITRE ATT&CK"
50[[rule.threat.technique]]
51id = "T1550"
52name = "Use Alternate Authentication Material"
53reference = "https://attack.mitre.org/techniques/T1550/"
54[[rule.threat.technique.subtechnique]]
55id = "T1550.001"
56name = "Application Access Token"
57reference = "https://attack.mitre.org/techniques/T1550/001/"
58
59
60
61[rule.threat.tactic]
62id = "TA0005"
63name = "Defense Evasion"
64reference = "https://attack.mitre.org/tactics/TA0005/"
65[[rule.threat]]
66framework = "MITRE ATT&CK"
67[[rule.threat.technique]]
68id = "T1078"
69name = "Valid Accounts"
70reference = "https://attack.mitre.org/techniques/T1078/"
71
72
73[rule.threat.tactic]
74id = "TA0001"
75name = "Initial Access"
76reference = "https://attack.mitre.org/tactics/TA0001/"

Setup

The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

References

Related rules

to-top