Detecting cloud federated credential abuse in AWS
You need to be able to detect events that indicate abuse of cloud federated credentials. These credentials are usually extracted from endpoint desktops or servers that provide federation services. Identity federation relies on objects such as Oauth2 tokens, cookies, or SAML assertions in order to provide seamless access between cloud and perimeter environments. If these objects are either hijacked or forged, then attackers are able to pivot into your cloud environment.
This use case contains searches that detect abnormal processes which may indicate the extraction of federated directory objects such as passwords, Oauth2 tokens, certificates, and keys, as well as searches relating to AWS specific events.
Data required
How to use Splunk software for this use case
Next steps
Splunk Enterprise Security provides a number of other searches to help reinforce your cloud security posture, including:
- Detecting AWS suspicious provisioning activities
- Detecting privilege escalation in your AWS environment
- Monitoring user activity spikes in AWS