AWS_Successful_Login_Without_MFA
ID: 100121
Description:
A user successfully completed an AWS console login without using MFA
Repository: Group: AWS Type: event
Default Status:
Enabled
Tags: |
---|
AWS |
Selector:
Query:
Filters:
Field | MUST hit |
---|---|
@cloudtrail.eventName | ConsoleLogin |
@cloudtrail.responseElements.ConsoleLogin | Success |
@cloudtrail.additionalEventData.MFAUsed | No |
Field | MUST NOT hit |
---|---|
@cloudtrail.responseElements.sAMLProviderList | exist (boolean) |
@cloudtrail.userIdentity.sessionContext.attributes.mfaAuthenticated | true |
Behavior Rule:
Key | Type | Behavior Category |
---|---|---|
@cloudtrail.userIdentity.arn | username | account login |
Risks:
Risks | Base Score | Dimension |
---|---|---|
Timeline | 0 | - |
Attributes:
Alias | Key |
---|---|
AccountID | @cloudtrail.recipientAccountId |
Username | @cloudtrail.userIdentity.userName |
Type | @cloudtrail.userIdentity.type |
EventName | @cloudtrail.eventName |
ClientIP | @cloudtrail.sourceIPAddress |
Correlation Rules:
First Occurrence:
Name | Window | Fields |
---|---|---|
NewUser | 10 days | @cloudtrail.userIdentity.userName |
Risks: | ML_NEW_USER |
History:
User | Date |
---|---|
em*n@fluencysecurity.com | 2021 Jan 12 17:36:20 EST |
em*n@fluencysecurity.com | 2021 Jan 12 23:57:25 EST |
This page was automatically created/formatted on Wed, 2022 May 4 21:43:53 EDT, from rule_dump.json (4d88bffdfb1cea26b3985f2193033606)