AWS IAM AdministratorAccess policy was applied to a role

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when the AdministratorAccess policy is attached to an AWS IAM role.

Strategy

This rule lets you monitor CloudTrail to detect if an attacker has attached the AWS managed policy AdministratorAccess to an AWS IAM role via the AttachRolePolicy API call.

Triage and response

  1. Determine if {{@userIdentity.session_name}} should have made a {{@evt.name}} API call.
  2. If the API call was not made by the user:
  • Rotate user credentials.
  • Determine what other API calls were made by the user.
  • Remove the AdministratorAccess policy from the {{@requestParameters.roleName}} role using the aws-cli command detach-role-policy.
  1. If the API call was made legitimately by the user:
  • Determine if the role {{@requestParameters.roleName}} requires the AdministratorAccess policy to perform its intended function.
  • Advise the user to find the least privileged policy that allows the role to operate as intended.
PREVIEWING: rtrieu/product-analytics-ui-changes