Platform Author Last Update aws Nick Jones 2024-12-02
An adversary may attempt to enumerate the configured IAM users within an account, to identify entities that they might wish to gain access to or backdoor.
MITRE IDs
Required Permissions
Required Parameters
None
Attacker Action
Detection Case
ELK query
When logs are ingested into ELK, the following Lucene query can be used to identify relevant events.
eventName:ListUsers AND eventSource:*.iam.amazonaws.com
Sigma Definition
title : Enumerate IAM users
id : 329a2783-4410-47b2-a113-36200ab1037a
description : An adversary may attempt to enumerate the configured IAM users within an account, to identify entities that they might wish to gain access to or backdoor.
- eventSource : " *.iam.amazonaws.com "
condition : selection_source and events
- Developers making legitimate changes to the environment. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.