This search looks for AWS CloudTrail events where a user A who has already permission to create access keys, makes an API call to create access keys for another user B. Attackers have been know to use this technique for Privilege Escalation in case new victim(user B) has more permissions than old victim(user B)
AWS Createaccesskey Help
You must install splunk AWS add on and Splunk App for AWS. This search works with AWS CloudTrail logs.
Open in Search