Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Platform Function Guides
    • Saner Device Management User Guide
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in SanerNow?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall SanerNow Agent using SanerNow Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy SanerNow Agent using SanerNow Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in SanerNow?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Troubleshoot or Analyze with Critical Activity Logs?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Patch Remediation from CIEM Dashboard?
    • CSRM
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Benchmark Compliance Rules in AWS and Azure
      • AWS
        • Implementing SecPod Default Rules in AWS
          • Implementing SecPod Global Rules in AWS
          • Implementing SecPod Regional Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS
          • Understand SOC2 Regional Rules in Azure
          • Introduction
          • Understand PCI DSS 3.2.1 Global Rules in AWS
          • Understand PCI DSS 3.2. 1 Regional in AWS
        • CIS 3.0.0 and 4.0.0 Rules in AWS
          • Introduction
          • Understand CIS 3.0.0 Global Rules in AWS
          • Understand CIS 4.0.0 Global Rules in AWS
          • Understand CIS 3.0.0 Regional Rules in AWS
          • Understand CIS 4.0.0 Regional Rules in AWS
        • SOC
          • Implementing SOC 2 Regional Rules in AWS
          • Implementing SOC 2 Global Rules in AWS
        • Implementing HIPAA HITRUST Rules
          • Implementing HIPAA HITRUST Global Rules in AWS
          • Implementing HIPAA HITRRUST Regional Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS
          • Introduction
          • Understand NIST 800-53 revision 5 Global Rules in AWS
          • Understand NIST 800-53 revision 5 Regional Rules in AWS
      • Azure
        • CIS Rules in Azure
          • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
          • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.0.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
        • NIST 800-53 Revision Rules in Azure
          • Understand NIST 800-53 Revision 5 Rules in Azure
          • Understand NIST 800-53 Revision 5 Global Rules in Azure
          • Understand NIST 800-53 Revision 5 Regional Rules in Azure
        • SecPod Rules in Azure
          • Understand SecPod Global Rules in Azure
          • Understand SecPod Regional Rules in Azure
          • Understand SecPod Default Rules in Azure
        • HIPAA HITRUST Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
        • PCI DSS Rules in Azure
          • Understand PCI DSS 4.0 Rules in Azure
          • Understand PCI DSS 4.0 Global Rules in Azure
          • Understand PCI DSS 4.0 Regional Rules in Azure
        • SOC Rules in Azure
          • Understand SOC2 Rules in Azure
          • Understand SOC2 Global Rules in Azure
          • Understand SOC2 Regional Rules in Azure

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner
  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
View Categories
  • Home
  • Docs
  • Saner Cloud
  • Learn About
  • Critical Events to Monitor in AWS

Critical Events to Monitor in AWS

Print Friendly, PDF & Email

Monitoring critical events is essential because these events often have significant consequences that require timely awareness, response, and management. Effective critical event monitoring allows for improved preparedness, response, and recovery, making it indispensable across various domains.

The following list contains a set of event names commonly associated with identity and access management (IAM) activities in cloud environments, particularly AWS. These events often relate to actions involving authentication, user management, roles, policies, and security.

Event NameDescription with Security Implication
AddClientIDToOpenIDConnectProviderAdds a client ID to an OpenID Connect provider for federated authentication, which may increase the attack surface by allowing external federated identities to access AWS resources.
AddRoleToInstanceProfileAssociates a role with an EC2 instance profile, enabling EC2 instances to assume the role. This can lead to escalated privileges for EC2 instances and potentially grant excessive permissions if misconfigured.
AddUserToGroupAdds an IAM user to an IAM group where the user inherits the group’s permissions that escalates their privileges if the group has excessive access.
AttachGroupPolicyAttaches an IAM policy to a group, applying permissions to all users in that group. Excessive permissions granted by the policy unintentionally results in escalating the privileges of group members.
AttachRolePolicyAttaches a policy to a role that leads to excessive permissions for the policy and eventually EC2 instances or services that should not be granted elevated access.
AttachUserPolicyAttaches a policy to a user, granting them specific permissions, and escalates the user’s privileges if the policy is overly permissive or improperly configured.
ChangePasswordUpdates the password for an IAM user, posing a potential security risk if changed by a malicious actor or unauthorized user.
ConsoleLoginEnables a user to log in to the AWS Management Console and crucial to monitor for unauthorized logins, as these may indicate a security breach.
CreateAccessKeyCreates a new access key for a user enabling API access. Access key creation increases the risk of unauthorized access if not properly managed or rotated.
CreateAccountAliasCreates an alias for an AWS account to simplify access via a URL. Although it poses low risk, it can be vulnerable to exploitation through social engineering attacks if the alias is misused.
CreateGroupCreates a new IAM group, which could mistakenly provide extensive permissions to users if not configured correctly.
CreateInstanceProfileCreates an IAM instance profile, which assigns a role to EC2 instances. There is a risk if the instance profile is associated with overly permissive roles, as it can grant EC2 instances excessive access.
CreateLoginProfileCreates a login profile for an IAM user, allowing console access while increasing the attack surface if not properly secured.
CreateOpenIDConnectProviderCreates an OpenID Connect (OIDC) provider for federated access, which can introduce significant risks if compromised, as it may allow unauthorized access to AWS resources.
CreatePolicyCreates a new IAM policy and if the policy is overly permissive, it could inadvertently grant excessive permissions across AWS resources.
CreatePolicyVersionCreates a new version of an existing IAM policy, which could result in less secure policy versions being used or outdated versions remaining with excessive privileges.
CreateRoleCreates a new IAM role. The role may be misconfigured with overly broad permissions, potentially escalating privileges or compromising security.
CreateSAMLProviderEstablishes a SAML provider for secure federated authentication. If compromised, a SAML provider can expose AWS resources to unauthorized access.
CreateUserCreates a new IAM user and increases the attack service on granting overly permissive policies.
CreateVirtualMFADeviceCreates a virtual MFA device to secure user access with multi-factor authentication, enhancing security by enforcing MFA. However, it may cause issues if misconfigured or if MFA devices are lost or stolen.
DeactivateMFADeviceDeactivates a user’s MFA device and weakens security by removing multi-factor authentication, increasing the risk of account compromise.
DeleteAccessKeyRemoves a user’s access key and revokes their API access; this is crucial for addressing a potential security incident.
DeleteAccountAliasDeletes an account alias, simplifying access but potentially disrupting integrations or visibility if the alias is used for marketing purposes.
DeleteAccountPasswordPolicyRemoves the password policy for the AWS account, eliminating control over user password requirements and potentially compromising account security.
DeleteGroupDeletes an IAM group, which removes the group’s permissions and may unintentionally revoke access or disrupt users relying on these group policies.
DeleteGroupPolicyDeletes a policy attached to a group and revokes permissions for all users in the group, potentially affecting business processes if not properly managed.
DeleteInstanceProfileDeletes an IAM instance profile and removes associated permissions from EC2 instances, which may disrupt operations or services.
DeleteLoginProfileRemoves a user’s login profile (password) and prevents them from accessing the console, which can hinder their ability to manage resources.
DeleteOpenIDConnectProviderDeletes an OIDC provider, which is used for federated authentication that can break federated authentication if it’s still in use, reducing access for users or applications relying on it.
DeletePolicyDeletes an IAM policy and revokes permissions granted by the policy, potentially disrupting users or services relying on those permissions.
DeleteRoleDeletes an IAM role and revokes permissions granted by the role, potentially breaking services or EC2 instances that relied on it.
DeleteRolePolicyDeletes a policy attached to a role and revokes permissions for any service or user assuming the role, potentially causing operational issues.
DeleteSAMLProviderDeletes a SAML provider and disables federated authentication via SAML, which could lock out users relying on it.
DeleteServerCertificateRemoves an SSL/TLS server certificate, potentially disrupting secure communication for services or applications dependent on it.
DeleteSigningCertificateDeletes a signing certificate used for code signing or API requests that disables secure signing for code or API requests, potentially impacting security or causing service disruptions.
DeleteSSHPublicKeyDeletes an SSH public key for a user and revokes SSH access for the user, potentially locking out legitimate access to EC2 instances.
DeleteUserDeletes an IAM user and permanently revokes all access associated with that user, which may disrupt legitimate access if not carefully planned.
DeleteUserPolicyDeletes a policy attached to a user and revokes specific permissions, potentially locking the user out of required resources or tasks.
DeleteVirtualMFADeviceRemoves a virtual MFA device, thereby disabling multi-factor authentication, which reduces account security and increases the risk of unauthorized access.
DetachGroupPolicyDisconnects a policy from a group, removing user permissions and possibly disrupting access to resources.
DetachRolePolicyDetaches a policy from a role, revoking permissions for any services or EC2 instances assuming that role, which may affect operations.
DetachUserPolicyDetaches a policy from a user and removes specific permissions, potentially impacting user access to critical resources.
EnableMFADeviceEnables an MFA device for a user and enhances security by requiring multi-factor authentication, reducing the risk of unauthorized access.
PutGroupPolicyCreates or updates a group policy, which can grant excessive permissions to users in the group, potentially escalating privileges if misconfigured.
PutRolePolicyCreates or updates a role policy. Misconfigured policies may grant excessive permissions, increasing the risk of privilege escalation.
PutUserPolicyCreates or updates a user policy, which could grant excessive permissions if misconfigured, leading to potential security risks.
RemoveClientIDFromOpenIDConnectProviderRemoves a client ID from an OpenID Connect provider and revokes federated access, which may break legitimate access for users or services relying on the provider.
RemoveRoleFromInstanceProfileRemoves a role from an EC2 instance profile and revokes permissions for EC2 instances, potentially disrupting operations.
RemoveUserFromGroupRemoves a user from an IAM group, revoking their permissions, which may inadvertently lock them out of necessary resources.
ResyncMFADeviceResynchronizes a user’s MFA device with AWS to ensure proper synchronization, preventing lockouts and enhancing security.
SetDefaultPolicyVersionSets the default version of a policy and may enable a less secure version, which could unintentionally reduce access controls or increase risk.
UpdateAccessKeyUpdates the access key for a user, which is important for rotating keys after a compromise or to enhance security. Note that this may disrupt services using the key.
UpdateAccountPasswordPolicyRevises the account password policy and modifies the strength of password security, which may affect overall account security.
UpdateAssumeRolePolicyAlters the assume role policy for a role, modifying who can assume it. This change could lead to privilege escalation if not adequately restricted.
UpdateGroupUpdates the settings or policies of an IAM group and grants additional permissions to its members, which may inadvertently increase the risk of privilege escalation.
UpdateLoginProfileUpdates a user’s login profile, primarily the password and might affect user access, potentially leading to lockouts or reducing unauthorized access.
UpdateOpenIDConnectProviderThumbprintUpdates the thumbprint for an OIDC provider and modifies the identity provider configurations, which may impact federated access and disrupt integrations.
UpdateSAMLProviderModifies the configuration of a SAML provider and updates federated authentication settings, which may disrupt access or reduce security.
UpdateServerCertificateUpdates the SSL/TLS certificate used for secure communication, impacting encrypted communication channels that could be exploited if misconfigured.
UpdateSigningCertificateUpdates the signing certificate for code or API request signatures, enhancing security for signed requests, however, may make them susceptible to spoofing if not managed correctly.
UpdateSSHPublicKeyUpdates the SSH public key for user access to EC2 instances and modifies the authorized keys for SSH, which may disrupt access to EC2 instances.
UpdateUserModifies user configurations, including permissions and settings that could change user privileges and affect access to resources.
UploadServerCertificateUploads a new SSH public key and changes the SSH access for a user, which could result in locking them out of necessary resources or creating security vulnerabilities.
UploadSigningCertificateUploads a new signing certificate and changes the security of signed code or API requests, which may leave them open to tampering.
UploadSSHPublicKeyUploads a new SSH public key and changes the SSH access for a user, which could result in locking them out of necessary resources or creating security vulnerabilities.

Related Topics

High Privilege in Critical Activity Logs for AWS

How to Troubleshoot or Analyze with Critical Activity Logs?

Share This Article :
  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Saner Plasma AI Assistant for Seamless User InteractionHigh-Privilege Actions in Critical Activity Logs for AWS
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.3.x