Skip to main content

Use of an AWS IAM role that was unused for a long period

ID:aws_iam_role_wakeup
Data type:AWS CloudTrail
Severity:
Medium
-
High
MITRE ATT&CK:TA0001:T1078.004

Description

AlphaSOC detected the use of the AssumeRole action for an AWS IAM role that had been inactive for an extended period. The AssumeRole action allows a user or service to temporarily assume the permissions of a specified AWS IAM role.

Impact

The unexpected use of a long-dormant IAM role could indicate unauthorized activity within the AWS environment. Dormant roles are often associated with excessive or outdated permissions and may be exploited by threat actors to gain unauthorized access to sensitive data or manipulate AWS resources.

Severity

SeverityCondition
Medium
Use of an AWS IAM role that was unused for a long period
High
Suspicious use of an AWS IAM role that was unused for a long period

Investigation and Remediation

Review the AWS CloudTrail logs to identify activity associated with the dormant AWS IAM role, including all actions performed after the AssumeRole API call. Verify whether this action was authorized and if not, rotate potentially compromised credentials and perform a security audit of the AWS environment for other signs of compromise.