* new hunt 'AWS IAM Unusual AWS Access Key Usage for User'
* updated version
* updating markdown
* bumping version
---------
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
* adding new rule 'AWS IAM Customer-Managed Policy Attached to Role by Rare User'
* adding investigation guide tag
* adds new hunting query
* updated notes
* changed name
* adjusting pyproject.toml version
* new hunt queries for aws
* sendcommand and getuserpassword queries
* s3 bucket access and secrets manager requests added
* ssm start session and service logging deleted added
* adding federated authentication queries
* added ec2 modify instance attribute query
* adding backdoor role creation query
* 2 new queries for discovery; added lookback windows
* added new hunting query for IAM activity with no MFA session
* added missing time windows
* adding new query for lambda add permissions
* adjusted query format
* added new query for ec2 instance deployment anomalies
* updated queries based on feedback; regenerated docs
* fixed queries
* removed new rule