AWS_Root_Password_Changed
ID: 100113
Description:
A user has successfully changed the root password on AWS
Repository: Group: AWS Type: event
Default Status:
Enabled
Tags: |
---|
AWS |
Selector:
Query:
Filters:
Field | MUST hit |
---|---|
@cloudtrail.eventName | Password Updated |
@cloudtrail.userIdentity.type | Root |
Field | MUST NOT hit |
---|---|
Behavior Rule:
Key | Type | Behavior Category |
---|---|---|
@cloudtrail.userIdentity.arn | username | security alert |
Risks:
Risks | Base Score | Dimension |
---|---|---|
Timeline | 0 | - |
Attributes:
Alias | Key |
---|---|
ARN | @cloudtrail.userIdentity.arn |
Type | @cloudtrail.userIdentity.type |
ClientIP | @cloudtrail.sourceIPAddress |
UserAgent | @cloudtrail.userAgent |
AccountID | @cloudtrail.userIdentity.accountId |
Correlation Rules:
First Occurrence:
Name | Window | Fields |
---|---|---|
NewUser | 10 days | @cloudtrail.userIdentity.arn |
Risks: | ML_NEW_USER |
History:
| User | Date | | :— | :— | | — | — |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)