Skip to main content

Multiple denied AWS assume role API calls requiring investigation

ID:aws_assume_role_access_denied
Data type:AWS CloudTrail
Severity:
Medium
MITRE ATT&CK:TA0007:T1580

Description

AlphaSOC detected 10 or more denied AWS assume role API calls for different roles within 15 minutes, involving actions such as AssumeRole, AssumeRoleWithSAML, or AssumeRoleWithWebIdentity. These API calls allow an entity (IAM user, AWS service, or application) to assume an AWS IAM role and potentially escalate privileges.

Impact

A high volume of denied attempts to assume a role may indicate an ongoing compromise, where an adversary has already gained initial access to the AWS environment and is trying to exploit misconfigured AWS IAM policies. If successful, it could lead to unauthorized access to sensitive AWS resources, potentially allowing unauthorized users to view, modify, or delete sensitive data, launch new resources, or misuse AWS services for malicious purposes.

Severity

SeverityCondition
Medium
Multiple denied AWS assume role API calls requiring investigation

Investigation and Remediation

Review AWS CloudTrail logs to identify the source of the denied API calls, including IP addresses, user agents, AWS regions, and any associated users or role identities. Verify whether the attempts were authorized. If unauthorized, rotate potentially compromised credentials and review AWS IAM policies and role configurations to ensure they adhere to the principle of least privilege.