Detecting AWS IAM Privilege Escalation

Security Splunk Threat Research Team

The Splunk Threat Research Team developed an analytic story to help security operations center (SOC) analysts detect adversaries attempting to escalate their privileges and gain elevated access to Amazon Web Services (AWS) resources. In this blog, we will:

Watch the video below to learn more about how we can simulate AWS Privilege Escalation TTPs using Atomic Red Team and detection engineering.

Amazon Web Services Identity and Access Management (IAM) Privilege Escalation

The AWS identity and access management (IAM) privilege escalation analytic story addresses various tactics, techniques and procedures (TTPs) used by attackers to escalate their privileges to gain additional access to an existing compromised AWS Environment.

AWS provides a neat feature called identity and access management (IAM) that helps organizations manage various AWS services and resources in a secure way. All IAM users have roles, groups and policies associated with them that govern and set permissions to allow specific users to bypass specific restrictions.

However, if these IAM policies are misconfigured (which is often the case) and also have specific combinations of weak permission, attackers can escalate their privileges to move laterally or further compromise the organization.

Rhino Security Labs and Bishop Fox Labs published comprehensive blogs detailing the various techniques attackers use to exploit IAM policies to gain elevated access. Inspired by their research, the Splunk Threat Research Team simulated these attacks using Atomic Red Team’s framework to allow for repeatability, and curated and collected the AWS Cloudtrail datasets, to provide you with detection queries to help uncover these potentially malicious events.

Since privilege escalation typically happens after exploitation, we made a few assumptions as we developed and simulated these detections:

Important Disclaimers

Here are a few examples of our Detection Searches:

Name
Technique ID
Tactic(s)
Note
AWS Create Policy Version to allow all resources
T1078.004
Privilege Escalation, Persistence
This query identifies a new policy created to allow “all” access to resources, which can include normal administrative activity as well as malicious activity.
AWS SetDefaultPolicyVersion
T1078.004
Privilege Escalation, Persistence
This query detects users who set default policy versions.
AWS CreateAccessKey
T1136.003
Privilege Escalation, Persistence
This query detects creation of access keys for other users.
AWS CreateLoginProfile
T1136.003
Privilege Escalation, Persistence
This query detects creation of login profile and console login events from the same source IP address.
AWS UpdateLoginProfile
T1136.003
Privilege Escalation, Persistence
This query detects API calls when a new password is set for another user.

Why Should You Care?

The information security community has observed an increase in cloud-based attacks, including major breaches. Common to most of these incidents is a mix of leaked credentials and IAM policy misconfigurations. Rhino Security has published an excellent blog highlighting numerous ways in which AWS credentials get compromised. The Capital One breach is one of the best examples to show how damaging misconfiguration of IAM policies can be.

This is why monitoring Cloudtrail logs for specific events that lead to AWS privilege escalation is crucial in order for defenders to stay on top of these threats.

Learn More

You can find the latest content about security analytic stories on GitHub and in Splunkbase. All of these detections are available in Splunk Security Essentials.

Feedback

Any feedback or requests? Feel free to put in an Issue on Github and we’ll follow up. You can also join us on the Slack channel #security-research. Follow these instructions If you need an invitation to our Splunk user groups on Slack.

Article last updated 7 April 2023.

Related Articles

Splunk Named a Leader in the 2022 IDC MarketScape for SIEM
Security
2 Minute Read

Splunk Named a Leader in the 2022 IDC MarketScape for SIEM

See why Splunk earned a spot in the 'Leaders' category in the 2022 IDC MarketScape for worldwide SIEM software.
Detecting Google Cloud Platform OAuth Token Abuse Using Splunk
Security
5 Minute Read

Detecting Google Cloud Platform OAuth Token Abuse Using Splunk

Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.
Delivering the Ultimate SOC Analyst Experience: Ending Fatigue with Splunk Enterprise Security
Security
5 Minute Read

Delivering the Ultimate SOC Analyst Experience: Ending Fatigue with Splunk Enterprise Security

End SOC analyst fatigue with Splunk Enterprise Security. Discover how unified TDIR, Agentic AI, and automation transform security operations, streamline investigations, and empower your team.