Skip to main content

AWS IAM user created with admin policy attached

ID:aws_iam_user_created_with_admin_policy
Data type:AWS CloudTrail
Severity:
Medium
MITRE ATT&CK:TA0003:T1136.003

Description

AlphaSOC detected the creation of an AWS IAM user with administrative privileges using the CreateUser or AttachUserPolicy actions. This activity may suggest a potential compromise, where a threat actor creates a new IAM user with full access to the organization's AWS resources and services.

Impact

The creation of an AWS IAM user with an attached admin policy could potentially allow a threat actor to perform any operation within the AWS environment, including creating, modifying, or deleting resources and accessing sensitive data.

Severity

SeverityCondition
Medium
AWS IAM user created with admin policy attached

Investigation and Remediation

Review the newly created AWS IAM user, its associated permissions, and all of the actions performed by this user. Verify whether the creation was authorized. If unauthorized, delete the user, rotate any potentially compromised credentials, and perform a security audit of the AWS environment for other signs of compromise.