[Rule Tuning] AWS IAM CompromisedKeyQuarantine Policy Attached to User (#5281)

This rule is working as expected, only instances of this alert in telemetry is for testing environments.
- uses `iam` instead of `any` for eql query
- added highlighted fields
This commit is contained in:
Isai
2025-11-17 16:25:38 -05:00
committed by GitHub
parent f2e2590d62
commit 37f28be816
@@ -2,7 +2,7 @@
creation_date = "2024/07/20"
integration = ["aws"]
maturity = "production"
updated_date = "2025/01/10"
updated_date = "2025/11/04"
[rule]
author = ["Elastic"]
@@ -70,7 +70,7 @@ timestamp_override = "event.ingested"
type = "eql"
query = '''
any where event.dataset == "aws.cloudtrail"
iam where event.dataset == "aws.cloudtrail"
and event.action == "AttachUserPolicy"
and event.outcome == "success"
and stringContains(aws.cloudtrail.request_parameters, "AWSCompromisedKeyQuarantine")
@@ -89,3 +89,18 @@ id = "TA0006"
name = "Credential Access"
reference = "https://attack.mitre.org/tactics/TA0006/"
[rule.investigation_fields]
field_names = [
"@timestamp",
"user.name",
"user_agent.original",
"source.ip",
"aws.cloudtrail.user_identity.arn",
"aws.cloudtrail.user_identity.type",
"aws.cloudtrail.user_identity.access_key_id",
"event.action",
"event.outcome",
"cloud.account.id",
"cloud.region",
"aws.cloudtrail.request_parameters"
]