Skip to content

Commit a8da49b

Browse files
imays11tradebot-elastic
authored andcommitted
[Rule Tuning] AWS IAM CompromisedKeyQuarantine Policy Attached to User (#5281)
This rule is working as expected, only instances of this alert in telemetry is for testing environments. - uses `iam` instead of `any` for eql query - added highlighted fields (cherry picked from commit 37f28be)
1 parent 79f32b5 commit a8da49b

File tree

1 file changed

+17
-2
lines changed

1 file changed

+17
-2
lines changed

rules/integrations/aws/credential_access_iam_compromisedkeyquarantine_policy_attached_to_user.toml

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/07/20"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/10"
5+
updated_date = "2025/11/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -70,7 +70,7 @@ timestamp_override = "event.ingested"
7070
type = "eql"
7171

7272
query = '''
73-
any where event.dataset == "aws.cloudtrail"
73+
iam where event.dataset == "aws.cloudtrail"
7474
and event.action == "AttachUserPolicy"
7575
and event.outcome == "success"
7676
and stringContains(aws.cloudtrail.request_parameters, "AWSCompromisedKeyQuarantine")
@@ -89,3 +89,18 @@ id = "TA0006"
8989
name = "Credential Access"
9090
reference = "https://attack.mitre.org/tactics/TA0006/"
9191

92+
[rule.investigation_fields]
93+
field_names = [
94+
"@timestamp",
95+
"user.name",
96+
"user_agent.original",
97+
"source.ip",
98+
"aws.cloudtrail.user_identity.arn",
99+
"aws.cloudtrail.user_identity.type",
100+
"aws.cloudtrail.user_identity.access_key_id",
101+
"event.action",
102+
"event.outcome",
103+
"cloud.account.id",
104+
"cloud.region",
105+
"aws.cloudtrail.request_parameters"
106+
]

0 commit comments

Comments
 (0)