Create New Policy Version (aws)
Platform | Author | Last Update |
---|---|---|
aws | Nick Jones | 2024-12-02 |
An attacker may attempt to create a new version of a given IAM policy in order to attach extra permissions to an entity they control.
MITRE IDs
Required Permissions
- iam:CreatePolicyVersion
Required Parameters
Name | Type | Description | Example Value |
---|---|---|---|
policy_arn | str | ARN of the policy to create a new version for | arn:aws:iam::123456789012:policy/test |
policy_document | str | New policy to upload - for the CLI, this should be a path to the json document. For Leonidas, this should be the JSON document itself. | file://path/to/administrator/policy.json |
Attacker Action
aws iam create-policy-version –policy-arn policy_arn –policy-document policy_document –set-as-default
Detection Case
ELK query
When logs are ingested into ELK, the following Lucene query can be used to identify relevant events.
eventName:CreatePolicyVersion AND eventSource:iam.amazonaws.com
Sigma Definition
---title: Create New Policy Versionid: b5104c3a-40f4-464a-934a-a917a89faf1astatus: experimentalauthor: Nick Jonesdate: 2024-12-02description: An attacker may attempt to create a new version of a given IAM policy in order to attach extra permissions to an entity they control.logsource: service: cloudtraildetection: selection_source: - eventSource: "iam.amazonaws.com" events: - eventName: "CreatePolicyVersion" condition: selection_source and eventslevel: lowtags: - attack.T1098
falsepositives: - Developers making legitimate changes to the environment. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.