Detection coverage in DCV across AWS, Azure and GCP for Account Manipulation: Additional Cloud Credentials, plus the corresponding Sigma rules in the CloudSigma library. Source data refreshed 2026-04-24.
Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts and instances within the environment.
For example, adversaries may add credentials for Service Principals and Applications in addition to existing legitimate credentials in Azure / Entra ID. These credentials include both x509 keys and passwords. With sufficient permissions, there are a variety of ways to add credentials including the Azure Portal, Azure command line interface, and Azure or Az PowerShell modules.
In infrastructure-as-a-service (IaaS) environments, after gaining access through Cloud Accounts, adversaries may generate or import their own SSH keys using either the <code>CreateKeyPair</code> or <code>ImportKeyPair</code> API in AWS or the <code>gcloud compute os-login ssh-keys add</code> command in GCP. This allows persistent access to instances within the cloud environment without further usage of the compromised cloud accounts.
Adversaries may also use the <code>CreateAccessKey</code> API in AWS or the <code>gcloud iam service-accounts keys create</code> command in GCP to add access keys to an account. Alternatively, they may use the <code>CreateLoginProfile</code> API in AWS to add a password that can be used to log into the AWS Management Console for Cloud Service Dashboard. If the target account has different permissions from the requesting account, the adversary may also be able to escalate their privileges in the environment (i.e. Cloud Accounts). For example, in Entra ID environments, an adversary with the Application Administrator role can add a new set of credentials to their application's service principal. In doing so the adversary would be able to access the service principal’s roles and permissions, which may be different from those of the Application Administrator.
In AWS environments, adversaries with the appropriate permissions may also use the `sts:GetFederationToken` API call to create a temporary set of credentials to Forge Web Credentials tied to the permissions of the original user account. These temporary credentials may remain valid for the duration of their lifetime even if the original account’s API credentials are deactivated.
In Entra ID environments with the app password feature enabled, adversaries may be able to add an app password to a user account. As app passwords are intended to be used with legacy devices that do not support multi-factor authentication (MFA), adding an app password can allow an adversary to bypass MFA requirements. Additionally, app passwords may remain valid even if the user’s primary password is reset.
Platforms: IaaS, Identity Provider, SaaS.
DCV maps 19 detections across 2 cloud providers to T1098.001. Coverage by source:
| Source | Cloud | Findings mapped | Avg confidence |
|---|---|---|---|
| AWS Config Rules | AWS | 6 | 0.50 |
| GCP Security Command Center | GCP | 6 | 0.83 |
| AWS Security Hub | AWS | 4 | 0.85 |
| AWS GuardDuty | AWS | 2 | 0.80 |
| GCP Chronicle | GCP | 1 | 0.85 |
CloudSigma ships 4 production-ready Sigma rules that detect T1098.001 across 4 platforms. Every rule below is validated against its source SIEM dialect before publication.
This rule is currently experimental. CloudSigma generated it from upstream threat intelligence; before enabling in production, tune the falsepositives section in your SIEM against your environment's known automation, service accounts and IP allowlist.
title: AWS IAM Access Key Creation for Persistence
id: a1b2c3d4-e5f6-4a7b-8c9d-0e1f2a3b4c5d
status: experimental
description: >
Detects creation of new IAM access keys or login profiles, which adversaries
use to establish persistent access to AWS accounts after initial compromise.
New access keys for existing users outside of normal rotation schedules
should be investigated.
author: CloudSigma
date: 2026-02-06
references:
- https://attack.mitre.org/techniques/T1098/001/
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1098.001
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: iam.amazonaws.com
eventName:
- CreateAccessKey
- CreateLoginProfile
- CreateServiceSpecificCredential
filter_self_management:
userIdentity.arn|contains: ':role/aws-service-role/'
condition: selection and not filter_self_management
falsepositives:
- Automated IAM access key rotation performed by secrets management tools like Vault or AWS Secrets Manager
- New employee onboarding processes that create console login profiles
level: high