Privilege escalation via SSM policy

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Detected usage of AttachUserPolicy/AttachGroupPolicy/AttachRolePolicy on SSM Policy. Attackers could use these operations for privilege escalation. Verify these actions with the user.

Attribute Value
Type Analytic Rule
Solution Amazon Web Services
ID c668c09f-5a49-43f9-b249-6b89a31ec8fb
Severity Medium
Status Available
Kind Scheduled
Tactics PrivilegeEscalation
Techniques T1484
Required Connectors AWS
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AWSCloudTrail EventName in "PutGroupPolicy,PutRolePolicy,PutUserPolicy" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Amazon Web Services