The Splunk Threat Research Team developed an analytic story to help security operations center (SOC) analysts detect adversaries attempting to escalate their privileges and gain elevated access to Amazon Web Services (AWS) resources. In this blog, we will:
Watch the video below to learn more about how we can simulate AWS Privilege Escalation TTPs using Atomic Red Team and detection engineering.
The AWS identity and access management (IAM) privilege escalation analytic story addresses various tactics, techniques and procedures (TTPs) used by attackers to escalate their privileges to gain additional access to an existing compromised AWS Environment.
AWS provides a neat feature called identity and access management (IAM) that helps organizations manage various AWS services and resources in a secure way. All IAM users have roles, groups and policies associated with them that govern and set permissions to allow specific users to bypass specific restrictions.
However, if these IAM policies are misconfigured (which is often the case) and also have specific combinations of weak permission, attackers can escalate their privileges to move laterally or further compromise the organization.
Rhino Security Labs and Bishop Fox Labs published comprehensive blogs detailing the various techniques attackers use to exploit IAM policies to gain elevated access. Inspired by their research, the Splunk Threat Research Team simulated these attacks using Atomic Red Team’s framework to allow for repeatability, and curated and collected the AWS Cloudtrail datasets, to provide you with detection queries to help uncover these potentially malicious events.
Since privilege escalation typically happens after exploitation, we made a few assumptions as we developed and simulated these detections:
Name |
Technique ID |
Tactic(s) |
Note |
AWS Create Policy Version to allow all resources |
T1078.004 |
Privilege Escalation, Persistence |
This query identifies a new policy created to allow “all” access to resources, which can include normal administrative activity as well as malicious activity. |
AWS SetDefaultPolicyVersion |
T1078.004 |
Privilege Escalation, Persistence |
This query detects users who set default policy versions. |
AWS CreateAccessKey |
T1136.003 |
Privilege Escalation, Persistence |
This query detects creation of access keys for other users. |
AWS CreateLoginProfile |
T1136.003 |
Privilege Escalation, Persistence |
This query detects creation of login profile and console login events from the same source IP address. |
AWS UpdateLoginProfile |
T1136.003 |
Privilege Escalation, Persistence |
This query detects API calls when a new password is set for another user. |
The information security community has observed an increase in cloud-based attacks, including major breaches. Common to most of these incidents is a mix of leaked credentials and IAM policy misconfigurations. Rhino Security has published an excellent blog highlighting numerous ways in which AWS credentials get compromised. The Capital One breach is one of the best examples to show how damaging misconfiguration of IAM policies can be.
This is why monitoring Cloudtrail logs for specific events that lead to AWS privilege escalation is crucial in order for defenders to stay on top of these threats.
You can find the latest content about security analytic stories on GitHub and in Splunkbase. All of these detections are available in Splunk Security Essentials.
Any feedback or requests? Feel free to put in an Issue on Github and we’ll follow up. You can also join us on the Slack channel #security-research. Follow these instructions If you need an invitation to our Splunk user groups on Slack.
Article last updated 7 April 2023.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.