AWS IAM SAML Provider Updated
Identifies when a user has updated a SAML provider in AWS. SAML providers are used to enable federated access to the AWS Management Console. This activity could be an indication of an attacker attempting to escalate privileges.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/09/22"
3integration = ["aws"]
4maturity = "production"
5updated_date = "2024/07/16"
6
7[rule]
8author = ["Elastic", "Austin Songer"]
9description = "Identifies when a user has updated a SAML provider in AWS. SAML providers are used to enable federated access to the AWS Management Console. This activity could be an indication of an attacker attempting to escalate privileges."
10false_positives = [
11 """
12 SAML Provider could be updated by a system administrator. Verify whether the user identity, user agent, and/or
13 hostname should be making changes in your environment. SAML Provider updates by unfamiliar users should be
14 investigated. If known behavior is causing false positives, it can be exempted from the rule.
15 """,
16]
17from = "now-9m"
18index = ["filebeat-*", "logs-aws.cloudtrail-*"]
19language = "kuery"
20license = "Elastic License v2"
21name = "AWS IAM SAML Provider Updated"
22note = """## Setup
23
24The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
25references = [
26 "https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateSAMLProvider.html",
27]
28risk_score = 47
29rule_id = "979729e7-0c52-4c4c-b71e-88103304a79f"
30severity = "medium"
31tags = [
32 "Domain: Cloud",
33 "Data Source: AWS",
34 "Data Source: Amazon Web Services",
35 "Data Source: AWS IAM",
36 "Use Case: Identity and Access Audit",
37 "Tactic: Privilege Escalation",
38]
39timestamp_override = "event.ingested"
40type = "query"
41
42query = '''
43event.dataset:aws.cloudtrail
44 and event.provider: iam.amazonaws.com
45 and event.action: UpdateSAMLProvider
46 and event.outcome:success
47'''
48
49
50[[rule.threat]]
51framework = "MITRE ATT&CK"
52[[rule.threat.technique]]
53id = "T1484"
54name = "Domain or Tenant Policy Modification"
55reference = "https://attack.mitre.org/techniques/T1484/"
56[[rule.threat.technique.subtechnique]]
57id = "T1484.002"
58name = "Trust Modification"
59reference = "https://attack.mitre.org/techniques/T1484/002/"
60
61
62
63[rule.threat.tactic]
64id = "TA0004"
65name = "Privilege Escalation"
66reference = "https://attack.mitre.org/tactics/TA0004/"```
Setup
The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
References
Related rules
- AWS IAM CompromisedKeyQuarantine Policy Attached to User
- AWS EC2 Instance Connect SSH Public Key Uploaded
- AWS IAM Roles Anywhere Profile Creation
- AWS IAM Roles Anywhere Trust Anchor Created with External CA
- AWS IAM Assume Role Policy Update