Platform | Author | Last Update |
---|
aws | Nick Jones | 2024-12-02 |
An attacker may attempt to add an IAM user to a group, in order to escalate their privileges
MITRE IDs
Required Permissions
Required Parameters
Name | Type | Description | Example Value |
---|
group | str | Group to add user to | example-group |
user | str | IAM user to add to group | example-user |
Attacker Action
Detection Case
ELK query
When logs are ingested into ELK, the following Lucene query can be used to identify relevant events.
Sigma Definition