Create Policy (aws)
Platform | Author | Last Update |
---|---|---|
aws | Nick Jones | 2024-12-02 |
An attacker may attempt to create a new version of a given IAM policy in order to attach extra permissions to an entity they control.
MITRE IDs
Required Permissions
- iam:CreatePolicy
Required Parameters
Name | Type | Description | Example Value |
---|---|---|---|
policy_name | str | ARN of the policy to create a new version for | arn:aws:iam::123456789012:policy/test |
policy_document | str | New policy to upload - for the CLI, this should be a path to the json document. For Leonidas, this should be the JSON document itself. | file://path/to/administrator/policy.json |
Attacker Action
aws iam create-policy --policy-name arn:aws:iam::123456789012:policy/test --policy-document file://path/to/administrator/policy.json
Detection Case
ELK query
When logs are ingested into ELK, the following Lucene query can be used to identify relevant events.
eventName:CreatePolicy AND eventSource:iam.amazonaws.com
Sigma Definition
---title: Create Policyid: 1352e02d-4207-4709-8980-b3a08f346c6dstatus: experimentalauthor: Nick Jonesdate: 2024-12-02description: An attacker may attempt to create a new version of a given IAM policy in order to attach extra permissions to an entity they control.logsource: service: cloudtraildetection: selection_source: - eventSource: "iam.amazonaws.com" events: - eventName: "CreatePolicy" condition: selection_source and eventslevel: lowtags: - attack.T1098
falsepositives: - Developers making legitimate changes to the environment. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.