AWS Management Console Root Login
editAWS Management Console Root Login
editIdentifies a successful login to the AWS Management Console by the Root user.
Rule type: query
Rule indices:
- filebeat-*
- logs-aws.cloudtrail-*
Severity: medium
Risk score: 47
Runs every: 5m
Searches indices from: now-6m (Date Math format, see also Additional look-back time)
Maximum alerts per execution: 100
References:
Tags:
- Domain: Cloud
- Data Source: AWS
- Data Source: Amazon Web Services
- Data Source: AWS Sign-In
- Use Case: Identity and Access Audit
- Resources: Investigation Guide
- Tactic: Initial Access
- Tactic: Privilege Escalation
Version: 212
Rule authors:
- Elastic
Rule license: Elastic License v2
Investigation guide
editTriage and analysis
Disclaimer: This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
Investigating AWS Management Console Root Login
The AWS root user is the original identity with unrestricted privileges over every resource in the account. Because it bypasses IAM boundaries and carries irreversible privileges, any successful root console login should be treated as a critical security event. AWS explicitly recommends locking away the root credentials and only using them for a small number of account-level administrative tasks (for example, closing an account, modifying support plans, or restoring MFA). See Tasks that require the root user.
This rule detects a successful AWS Management Console login by the root user (ConsoleLogin events with userIdentity.type: Root and event.outcome: Success).
Possible investigation steps
- Confirm legitimacy. Contact the designated root credential custodian or account owner to verify whether this login was expected and approved. Root access should only occur under documented change-control conditions.
- Review contextual event details. Examine the CloudTrail fields in the alert:
-
source.ip– does it match known corporate IPs or expected admin VPNs? -
user_agent.original– browser or automation? -
geo fields– consistent with normal operations? -
@timestamp– within a planned maintenance window? - Check for prior or subsequent root activity. Query CloudTrail for the last 30–90 days for any other root logins or root-initiated API calls. Multiple or recent root logins can indicate credential misuse.
- Correlate follow-on actions. Look for risky API calls immediately after the login, such as:
-
CreateUser,CreateAccessKey,AttachRolePolicy,PutBucketPolicy,UpdateAssumeRolePolicy,DeleteTrail, orStopLogging. These actions may indicate persistence or cover-up attempts. - Cross-account verification. If the root user is federated through AWS Organizations or linked accounts, confirm no simultaneous logins occurred elsewhere.
False positive analysis
- Planned administrative actions. Some rare maintenance tasks require root credentials (for example, payment method updates). If the login aligns with documented change control and was performed using MFA by the approved owner, the alert can be closed as benign.
- Third-party managed account scenarios. Managed service providers may log in as root during onboarding or support activities. Confirm via ticketing or contractual documentation.
Response and remediation
The AWS Incident Response Playbooks classify root logins as Priority-1 events due to full-environment control. Follow these steps whether or not you have a dedicated IR team.
1. Immediate verification and containment - If the login was not authorized or cannot be confirmed quickly: - Reset the root password using the AWS Management Console. - Rotate or remove any root access keys (root keys should normally not exist). - Ensure MFA is enabled and enforced on the root account. - Notify your security operations or cloud governance team.
2. Evidence preservation - Export the alert’s CloudTrail record and all subsequent events for 1 hour after the login. Store them in a restricted, immutable S3 evidence bucket. - Retain related GuardDuty findings, AWS Config history, and CloudTrail logs for the same period.
3. Scope and investigation
- Review additional events under the same source.ip to detect resource creation, IAM changes, or billing actions.
- Inspect newly created users, roles, or keys since the login time to identify potential persistence mechanisms.
- Check for any disabled or deleted CloudTrail trails, Security Hub findings suppression, or logging configuration changes.
4. Recovery and hardening
- Confirm MFA is working and only the authorized owner can access the root credentials.
- Store root credentials in an offline vault under dual-custody control.
- Enable organization-wide CloudTrail, GuardDuty, and Security Hub across all regions.
- Implement policy and automation to alert on any future userIdentity.type: Root logins in real time.
- Conduct a short post-incident review to update root-access procedures and reinforce least-privilege IAM practices.
Additional information
- AWS IR Playbooks: See “Account Compromise” and “Credential Compromise” playbooks for containment and recovery procedures.
- AWS Customer Playbook Framework: Reference “Account Access Investigation” for evidence handling and credential rotation steps.
- AWS Documentation: Tasks that require the root user.
- Security Best Practices: AWS Knowledge Center – Security Best Practices.
Rule query
editevent.dataset:aws.cloudtrail and event.provider:signin.amazonaws.com and event.action:ConsoleLogin and aws.cloudtrail.user_identity.type:Root and event.outcome:success
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Initial Access
- ID: TA0001
- Reference URL: https://attack.mitre.org/tactics/TA0001/
-
Technique:
- Name: Valid Accounts
- ID: T1078
- Reference URL: https://attack.mitre.org/techniques/T1078/
-
Sub-technique:
- Name: Cloud Accounts
- ID: T1078.004
- Reference URL: https://attack.mitre.org/techniques/T1078/004/
-
Tactic:
- Name: Privilege Escalation
- ID: TA0004
- Reference URL: https://attack.mitre.org/tactics/TA0004/
-
Technique:
- Name: Valid Accounts
- ID: T1078
- Reference URL: https://attack.mitre.org/techniques/T1078/
-
Sub-technique:
- Name: Cloud Accounts
- ID: T1078.004
- Reference URL: https://attack.mitre.org/techniques/T1078/004/