Skip to main content

Threat Detectors

NameOverviewVendorInputSeverityDisabled by DefaultActions
Change to IAM Role Policy ConfigurationThis detector will create an issue when one or more policies that apply to an IAM role are added or removed. It will also create an is...AWS3No
Change to IAM Group MembershipIdentify when IAM users are added or removed from groups....AWS3No
Change to Policies for IAM GroupThis detector will create an issue when there is a change to the inline policy, or to the lis...AWS3No
Change to IAM User Policy ConfigurationThis detector will create an issue when one or more policies that apply to an IAM user are added or removed. One or more of the...AWS3No
CloudTrail Disabled Or ModifiedAWS CloudTrail is a key service for logging, monitoring, and auditing events in AWS accounts. CloudTrail stores 90 days of events in its internal event history, b...AWS4No
Console LoginThis detector monitors CloudTrail events for those of eventType: AwsConsoleSignIn to see when someone logs into the AWS management console. The detector identifies logins by IAM users within the ...AWS3NoDisable IAM User
Multiple Failed Login Attempts For IAM UserThis detector creates an issue when there are multiple failed attempts to log in to the AWS Management Console for your account as an IAM user within a configurable period of time. This includes login...AWS4NoDisable IAM User
Multiple Failed Login Attempts For IAM User Followed By SuccessThis detector creates an issue when there are multiple failed attempts to log in to the AWS Console, followed by a successful login for an IAM user within a configurable period of time. This dete...AWS4No
AWS Console GetSigninToken EventThis detector identifies suspicious "GetSigninToken" events in the AWS Console. It alerts when an attacker potentially uses tools like "aws_consoler" to create temporary federated credentials, bypassi...AWSExpected User Agents3No
IAM Group CreatedA new IAM group was created. IAM groups can be assigned [roles]...AWS4No
Root User LoginThis detector identifies whenever someone logs in to the AWS console as the root user. Login events are identified by monitoring [AWS CloudTrail](https://docs.aws.amazon.com/awscloudtrail/latest/userg...AWS4No
Root User Login Without MFAThis detector identifies whenever someone logs in to the AWS console as the root user without Multifactor Authentication (MFA). Login events are identified by monitoring [AWS CloudTrail](https://docs....AWS5No
S3 Bucket Permissions ModifiedThis detector monitors CloudTrail for events that indicate that the permissions for an S3 bucket have been modi...AWS3NoDisable S3 Bucket Public Access
Security Group Ingress or Egress Rules ModifiedThis detector reports when the ingress or egress rules for a Security Group change. A unique issue will be...AWS4No
AWS Static Access Key UsedThis detector monitors CloudTrail events and identifies when [access keys](https://docs.aws.amazon.com/general/...AWS3NoDisable IAM User
UnauthorizedAccess Followed By Create UserThis detector reports an issue when an IAM user ***that has an [UnauthorizedAccess](https://docs.aws.amazon.com/guardduty/latest/u...AWS4NoDisable IAM User
Unauthorized RegionThis detects if an unauthorized region is used....AWSAllowed Regions5Yes
Unauthorized ServiceThis detects if an unauthorized service is used....AWSAllowed Services5Yes
Unauthorized User in UseA user not in the allowed list of users was detected....AWSAuthorized Users2YesDisable IAM User
Unexpected User ActivityThis detector will detect api events to the cloud control plane from unexpected users. For immutable infrastructure, api write events should be limited to CI/CD pipeline users or strictly limited to a...AWSExempt Users, Exempt Role Users4YesDisable IAM User
IAM User CreatedThis detector identifies when new IAM users are created. IAM users can be given very broad access to services and resources in an AWS account, depending on the groups, roles, and policies that apply t...AWS4NoDisable IAM User
New IAM User Created An EBS SnapshotThis detector reports an issue when a new IAM user creates an [EBS snapshot](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSSn...AWS4NoDisable IAM User