Detection Library
criticalproductionOCICloudT1098T1078.004

OCI IAM Policy Change by Non-Admin Principal

Detects creation, modification, or deletion of OCI IAM policies by principals that are not designated IAM administrators.

Updated Dec 10, 2024 · Detection Engineering Team

ociiamprivilege-escalationpolicy-changecloud

Problem Statement

OCI IAM policy changes represent a critical privilege escalation path. An attacker with write access to IAM can grant themselves or others administrator-level permissions across an entire tenancy.

Sample Logs

{"eventTime":"2024-12-10T11:45:22Z","eventName":"CreatePolicy","requestAction":"POST","principalId":"ocid1.user.oc1..aaaaadev9999","principalName":"dev-user@corp.com","compartmentId":"ocid1.compartment.oc1..root","requestParameters":{"name":"escalation-policy","statements":["Allow group Administrators to manage all-resources in tenancy"]},"sourceIPAddress":"10.0.5.88","responseStatus":"200"}
{"eventTime":"2024-12-10T11:47:05Z","eventName":"UpdatePolicy","requestAction":"PUT","principalId":"ocid1.user.oc1..aaaaadev9999","principalName":"dev-user@corp.com","compartmentId":"ocid1.compartment.oc1..aaaa5678","requestParameters":{"statements":["Allow any-user to manage buckets in tenancy"]},"sourceIPAddress":"10.0.5.88","responseStatus":"200"}

Required Fields

eventName
requestAction
principalId
principalName
compartmentId
requestParameters.statements
sourceIPAddress
responseStatus

False Positives

  • ·Authorized IAM admins performing planned policy updates
  • ·Terraform or Ansible automation using service principals
  • ·OCI IAM administrator role assignments

Tuning Guidance

Maintain an allowlist of authorized IAM admin OCIDs and service account names. Alert specifically on human user principals. Cross-reference with change management records for scheduled updates.