Detectionmediumexperimental
AWS ConsoleLogin Failed Authentication
Detects failed AWS console login attempts due to authentication failures. Monitoring these events is crucial for identifying potential brute-force attacks or unauthorized access attempts to AWS accounts.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Ivan Saakov, Nasreddine Bencherchali (Nextron Systems)Created Sun Oct 196393e346-1977-46ef-8987-ad414a145fadcloud
Log Source
AWScloudtrail
ProductAWS← raw: aws
Servicecloudtrail← raw: cloudtrail
Detection Logic
Detection Logic1 selector
detection:
selection:
eventName: 'ConsoleLogin'
errorMessage: 'Failed authentication'
condition: selectionFalse Positives
Legitimate failed login attempts by authorized users. Investigate the source of repeated failed login attempts.
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
6393e346-1977-46ef-8987-ad414a145fad
Status
experimental
Level
medium
Type
Detection
Created
Sun Oct 19
Path
rules/cloud/aws/cloudtrail/aws_cloudtrail_console_login_failed_authentication.yml
Raw Tags
attack.credential-accessattack.t1110