AWS SAML Activity

Identifies when SAML activity has occurred in AWS. An adversary could manipulate SAML to maintain access to the target.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2021/09/22"
 3integration = ["aws"]
 4maturity = "production"
 5min_stack_comments = "AWS integration breaking changes, bumping version to ^2.0.0"
 6min_stack_version = "8.9.0"
 7updated_date = "2024/04/14"
 8
 9[rule]
10author = ["Austin Songer"]
11description = "Identifies when SAML activity has occurred in AWS. An adversary could manipulate SAML to maintain access to the target."
12false_positives = [
13    """
14    SAML Provider could be updated by a system administrator. Verify whether the user identity, user agent, and/or
15    hostname should be making changes in your environment. SAML Provider updates by unfamiliar users should be
16    investigated. If known behavior is causing false positives, it can be exempted from the rule.
17    """,
18]
19from = "now-25m"
20index = ["filebeat-*", "logs-aws.cloudtrail-*"]
21language = "kuery"
22license = "Elastic License v2"
23name = "AWS SAML Activity"
24note = """## Setup
25
26The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
27references = [
28    "https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateSAMLProvider.html",
29    "https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithSAML.html",
30]
31risk_score = 21
32rule_id = "979729e7-0c52-4c4c-b71e-88103304a79f"
33severity = "low"
34tags = ["Domain: Cloud", "Data Source: AWS", "Data Source: Amazon Web Services", "Use Case: Identity and Access Audit", "Tactic: Defense Evasion"]
35timestamp_override = "event.ingested"
36type = "query"
37
38query = '''
39event.dataset:aws.cloudtrail and event.provider:(iam.amazonaws.com or sts.amazonaws.com) and event.action:(Assumerolewithsaml or
40UpdateSAMLProvider) and event.outcome:success
41'''
42
43
44[[rule.threat]]
45framework = "MITRE ATT&CK"
46[[rule.threat.technique]]
47id = "T1550"
48name = "Use Alternate Authentication Material"
49reference = "https://attack.mitre.org/techniques/T1550/"
50[[rule.threat.technique.subtechnique]]
51id = "T1550.001"
52name = "Application Access Token"
53reference = "https://attack.mitre.org/techniques/T1550/001/"
54
55
56
57[rule.threat.tactic]
58id = "TA0005"
59name = "Defense Evasion"
60reference = "https://attack.mitre.org/tactics/TA0005/"
61[[rule.threat]]
62framework = "MITRE ATT&CK"
63[[rule.threat.technique]]
64id = "T1078"
65name = "Valid Accounts"
66reference = "https://attack.mitre.org/techniques/T1078/"
67
68
69[rule.threat.tactic]
70id = "TA0001"
71name = "Initial Access"
72reference = "https://attack.mitre.org/tactics/TA0001/"

Setup

The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

References

Related rules

to-top