AWS Suspicious SAML Activity

Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.

Sigma rule (View on GitHub)

 1title: AWS Suspicious SAML Activity
 2id: f43f5d2f-3f2a-4cc8-b1af-81fde7dbaf0e
 3status: test
 4description: Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.
 5references:
 6    - https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateSAMLProvider.html
 7    - https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithSAML.html
 8author: Austin Songer
 9date: 2021-09-22
10modified: 2022-12-18
11tags:
12    - attack.defense-evasion
13    - attack.initial-access
14    - attack.lateral-movement
15    - attack.persistence
16    - attack.privilege-escalation
17    - attack.t1078
18    - attack.t1548
19    - attack.t1550
20    - attack.t1550.001
21logsource:
22    product: aws
23    service: cloudtrail
24detection:
25    selection_sts:
26        eventSource: 'sts.amazonaws.com'
27        eventName: 'AssumeRoleWithSAML'
28    selection_iam:
29        eventSource: 'iam.amazonaws.com'
30        eventName: 'UpdateSAMLProvider'
31    condition: 1 of selection_*
32falsepositives:
33    - Automated processes that uses Terraform may lead to false positives.
34    - SAML Provider could be updated by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
35    - SAML Provider being updated from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
36level: medium

References

Related rules

to-top