CloudTrail¶
Browse the CloudTrail mappings on this page, download the mappings (in CSV/STIX format), or visualize the sensor coverage in ATT&CK Navigator.
Download CSV Download STIX Open in ATT&CK Navigator
Enterprise¶
EVENT |
ATT&CK MAPPING |
---|---|
AddClientIDToOpenIDConnectProvider
Adds a new client ID (also known as audience) to the list of client IDs already registered for the specified IAM OpenID Connect (OIDC) provider resource.
|
Data Source: Active Directory
Data Component: Active Directory Object Modification
|
AddRoleToInstanceProfile
Adds the specified IAM role to the specified instance profile. An instance profile can contain only one role, and this quota cannot be increased. You can remove the existing role and then add a different role to an instance profile.
|
Data Source: Instance
Data Component: Instance Metadata
|
AddUserToGroup
A user has been added to a group.
|
Data Source: Group
Data Component: Group Modification
|
AttachGroupPolicy
A managed policy has been added to an IAM group.
|
Data Source: Group
Data Component: Group Modification
|
AttachRolePolicy
A managed policy has been added to an IAM role.
|
Data Source: User Account
Data Component: User Account Metadata
|
AttachUserPolicy
A managed policy has been added to an IAM user.
|
Data Source: User Account
Data Component: User Account Metadata
|
ChangePassword
A password for an IAM user has been changed. Changes the password of the IAM user who is calling this operation. This operation can be performed using the AWS CLI, the AWS API, or the My Security Credentials page in the AWS Management Console. The AWS account root user password is not affected by this operation.
|
Data Source: User Account
Data Component: User Account Metadata
|
ConsoleLogin
A user has signed into AWS Management Console. That user could be an account owner, a federated user or an IAM user.
|
Data Source: Logon Session
Data Component: Logon Session Creation
|
CreateAccessKey
A new AWS secret access key and access key ID has been created.
|
Data Source: User Account
Data Component: User Account Metadata
|
CreateAccountAlias
Creates an alias for your AWS account.
|
Data Source: User Account
Data Component: User Account Metadata
|
CreateGroup
A new group has been created.
|
Data Source: Group
Data Component: Group Creation
|
CreateImage
Creates an Amazon EBS-backed AMI from an Amazon EBS-backed instance that is either running or stopped.
|
Data Source: Image
Data Component: Image Creation
|
CreateInstanceProfile
Creates a new instance profile.
|
Data Source: Instance
Data Component: Instance Metadata
|
CreateLoginProfile
A new password has been created for a user to access AWS services through the management console.
|
Data Source: User Account
Data Component: User Account Metadata
|
CreateOpenIDConnectProvider
Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC). The OIDC provider that you create with this operation can be used as a principal in a role’s trust policy. Such a policy establishes a trust relationship between AWS and the OIDC provider.
|
Data Source: Active Directory
Data Component: Active Directory Object Creation
|
CreatePolicy
A new managed policy has been created for an AWS account.
|
Data Source: User Account
Data Component: User Account Metadata
|
CreatePolicyVersion
Creates a new version of the specified managed policy. To update a managed policy, you create a new policy version. A managed policy can have up to five versions. If the policy has five versions, you must delete an existing version using DeletePolicyVersion before you create a new version.
|
Data Source: User Account
Data Component: User Account Metadata
|
CreateRole
A new role for an AWS account has been created.
|
Data Source: User Account
Data Component: User Account Metadata
|
CreateSAMLProvider
Creates an IAM resource that describes an identity provider (IdP) that supports SAML 2.0. The SAML provider resource that you create with this operation can be used as a principal in an IAM role’s trust policy. Such a policy can enable federated users who sign in using the SAML IdP to assume the role. You can create an IAM role that supports Web-based single sign-on (SSO) to the AWS Management Console or one that supports API access to AWS. When you create the SAML provider resource, you upload a SAML metadata document that you get from your IdP.
|
Data Source: Active Directory
Data Component: Active Directory Object Metadata
|
CreateServiceLinkedRole
Creates an IAM role that is linked to a specific AWS service. The service controls the attached policies and when the role can be deleted. This helps ensure that the service is not broken by an unexpectedly changed or deleted role, which could put your AWS resources into an unknown state.
|
Data Source: User Account
Data Component: User Account Metadata
|
CreateServiceSpecificCredential
Generates a set of credentials consisting of a user name and password that can be used to access the service specified in the request. These credentials are generated by IAM, and can be used only for the specified service. You can have a maximum of two sets of service-specific credentials for each supported service per user.
|
Data Source: User Account
Data Component: User Account Metadata
|
CreateSnapshot
Creates a snapshot of an EBS volume and stores it in Amazon S3.
|
Data Source: Snapshot
Data Component: Snapshot Creation
|
CreateUser
A new IAM user has been created for an AWS account.
|
Data Source: User Account
Data Component: User Account Creation
|
CreateVirtualMFADevice
Creates a new virtual MFA device for the AWS account. After creating the virtual MFA, use EnableMFADevice to attach the MFA device to an IAM user.
|
Data Source: User Account
Data Component: User Account Authentication
|
CreateVolume
Creates an EBS volume that can be attached to an instance in the same Availability Zone.
|
Data Source: Volume
Data Component: Volume Creation
|
DeactivateMFADevice
Deactivates the specified MFA device and removes it from association with the user name for which it was originally enabled.
|
Data Source: User Account
Data Component: User Account Authentication
|
DeleteAccessKey
An access key pair for an IAM user has been deleted.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteAccountAlias
An AWS account alias has been deleted.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteAccountPasswordPolicy
A password policy for an account has been deleted.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteGroup
An IAM group has been deleted. The group won’t have contained any users or policies at time of deletion.
|
Data Source: Group
Data Component: Group Deletion
|
DeleteGroupPolicy
An inline policy for an IAM group has been deleted.
|
Data Source: Group
Data Component: Group Metadata
|
DeleteInstanceProfile
Deletes the specified instance profile. The instance profile must not have an associated role.
|
Data Source: Instance
Data Component: Instance Metadata
|
DeleteLoginProfile
A password for an IAM user has been deleted thus removing that user’s ability to access services through the console.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteOpenIDConnectProvider
Deletes an OpenID Connect identity provider (IdP) resource object in IAM. Deleting an IAM OIDC provider resource does not update any roles that reference the provider as a principal in their trust policies. Any attempt to assume a role that references a deleted provider fails.
|
Data Source: Active Directory
Data Component: Active Directory Object Deletion
|
DeletePolicyVersion
A version of a policy has been deleted.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteRole
A role has been deleted. The role will not have had any policies attached if it was able to be deleted.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteRolePermissionsBoundary
Deletes the permissions boundary for the specified IAM role. You cannot set the boundary for a service-linked role.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteRolePolicy
An inline policy for an IAM role has been deleted.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteSAMLProvider
Deletes a SAML provider resource in IAM. Deleting the provider resource from IAM does not update any roles that reference the SAML provider resource’s ARN as a principal in their trust policies. Any attempt to assume a role that references a non-existent provider resource ARN fails.
|
Data Source: Active Directory
Data Component: Active Directory Object Deletion
|
DeleteSSHPublicKey
An SSH public key has been deleted. The SSH public key deleted by this operation is used only for authenticating the associated IAM user to an CodeCommit repository.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteServerCertificate
A server certificate has been deleted.
|
Data Source: Certificate
Data Component: Certificate Deletion
|
DeleteServiceLinkedRole
Submits a service-linked role deletion request and returns a DeletionTaskId, which you can use to check the status of the deletion. Before you call this operation, confirm that the role has no active sessions and that any resources used by the role in the linked service are deleted.
|
Data Source: Cloud Service Account
Data Component: Cloud Service Account Metadata
|
DeleteServiceSpecificCredential
Deletes the specified service-specific credential.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteSigningCertificate
A signing certificate has been deleted.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteSnapshot
Deletes the specified snapshot.
|
Data Source: Snapshot
Data Component: Snapshot Deletion
|
DeleteUser
A user has been deleted.
|
Data Source: User Account
Data Component: User Account Deletion
|
DeleteUserPermissionsBoundary
Deletes the permissions boundary for the specified IAM user.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteUserPolicy
An inline policy for an IAM user has been deleted.
|
Data Source: User Account
Data Component: User Account Metadata
|
DeleteVirtualMFADevice
Deletes a virtual MFA device.
|
Data Source: User Account
Data Component: User Account Authentication
|
DetachGroupPolicy
Removes the specified managed policy from the specified IAM group.
|
Data Source: Group
Data Component: Group Metadata
|
DetachRolePolicy
A managed policy has been removed from a role.
|
Data Source: User Account
Data Component: User Account Metadata
|
DetachUserPolicy
A managed policy has been removed from a user.
|
Data Source: User Account
Data Component: User Account Metadata
|
DetachVolume
Detaches an EBS volume from an instance.
|
Data Source: Volume
Data Component: Volume Modification
|
EnableMFADevice
Enables the specified MFA device and associates it with the specified IAM user. When enabled, the MFA device is required for every subsequent login by the IAM user associated with the device.
|
Data Source: User Account
Data Component: User Account Authentication
|
GenerateCredentialReport
Retrieves a credential report for the AWS account.
|
Data Source: User Account
Data Component: User Account Metadata
|
GenerateOrganizationsAccessReport
Generates a report for service last accessed data for AWS Organizations. You can generate a report for any entities (organization root, organizational unit, or account) or policies in your organization. To call this operation, you must be signed in using your Organizations management account credentials. You can use your long-term IAM user or root user credentials, or temporary credentials from assuming an IAM role. SCPs must be enabled for your organization root. You must have the required IAM and Organizations permissions.
|
Data Source: Cloud Service Account
Data Component: Cloud Service Account Metadata
|
GenerateServiceLastAccessedDetails
Generates a report that includes details about when an IAM resource (user, group, role, or policy) was last used in an attempt to access AWS services. Recent activity usually appears within four hours.
|
Data Source: Cloud Service
Data Component: Cloud Service Metadata
|
GetAccountAuthorizationDetails
Retrieves information about all IAM users, groups, roles, and policies in your AWS account, including their relationships to one another. Use this operation to obtain a snapshot of the configuration of IAM permissions (users, groups, roles, and policies) in your account.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetAccountPasswordPolicy
Retrieves the password policy for the AWS account. This tells you the complexity requirements and mandatory rotation periods for the IAM user passwords in your account.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetAccountSummary
Retrieves information about IAM entity usage and IAM quotas in the AWS account.
|
Data Source: User Account
Data Component: User Account Access
|
GetContextKeysForCustomPolicy
Gets a list of all of the context keys referenced in the input policies. The policies are supplied as a list of one or more strings. To get the context keys from policies associated with an IAM user, group, or role, use GetContextKeysForPrincipalPolicy.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetContextKeysForPrincipalPolicy
Gets a list of all of the context keys referenced in all the IAM policies that are attached to the specified IAM entity. The entity can be an IAM user, group, or role. If you specify a user, then the request also includes all of the policies attached to groups that the user is a member of.
|
Data Source: Group
Data Component: Group Metadata
|
GetContextKeysForPrincipalPolicy
Gets a list of all of the context keys referenced in all the IAM policies that are attached to the specified IAM entity. The entity can be an IAM user, group, or role. If you specify a user, then the request also includes all of the policies attached to groups that the user is a member of.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetCredentialReport
Retrieves a credential report for the AWS account.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetGroup
Returns a list of IAM users that are in the specified IAM group.
|
Data Source: Group
Data Component: Group Access
|
GetGroupPolicy
Retrieves the specified inline policy document that is embedded in the specified IAM group.
|
Data Source: Group
Data Component: Group Metadata
|
GetInstanceProfile
Retrieves information about the specified instance profile, including the instance profile’s path, GUID, ARN, and role.
|
Data Source: Instance
Data Component: Instance Metadata
|
GetLoginprofile
Retrieves the user name and password-creation date for the specified IAM user.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetMFADevice
Retrieves information about an MFA device for a specified user.
|
Data Source: User Account
Data Component: User Account Authentication
|
GetOpenIDConnectProvider
Returns information about the specified OpenID Connect (OIDC) provider resource object in IAM.
|
Data Source: Active Directory
Data Component: Active Directory Object Access
|
GetOrganizationsAccessReport
Retrieves the service last accessed data report for AWS Organizations that was previously generated using the GenerateOrganizationsAccessReport operation. This operation retrieves the status of your report job and the report contents. .. To call this operation, you must be signed in to the management account in your organization. SCPs must be enabled for your organization root. You must have permissions to perform this operation. For each service that principals in an account (root user, IAM users, or IAM roles) could access using SCPs, the operation returns details about the most recent access attempt.
|
Data Source: Cloud Service Account
Data Component: Cloud Service Account Access
|
GetPolicy
Retrieves information about the specified managed policy, including the policy’s default version and the total number of IAM users, groups, and roles to which the policy is attached.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetPolicyVersion
Retrieves information about the specified version of the specified managed policy, including the policy document.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetRole
Retrieves information about the specified role, including the role’s path, GUID, ARN, and the role’s trust policy that grants permission to assume the role.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetRolePolicy
Retrieves the specified inline policy document that is embedded with the specified IAM role.
|
Data Source: User Account
Data Component: User Account Metadata
|
GetSSHPublicKey
Retrieves the specified SSH public key, including metadata about the key. The SSH public key retrieved by this operation is used only for authenticating the associated IAM user to an CodeCommit repository.
|
Data Source: User Account
Data Component: User Account Access
|
GetServerCertificate
Retrieves information about the specified server certificate stored in IAM.
|
Data Source: Certificate
Data Component: Certificate Access
|
GetServiceLastAccessedDetails
Retrieves a service last accessed report that was created using the GenerateServiceLastAccessedDetails operation. The report includes a list of AWS services that the resource (user, group, role, or managed policy) can access.
|
Data Source: Cloud Service Account
Data Component: Cloud Service Account Metadata
|
GetServiceLastAccessedDetailsWithEntities
After you generate a group or policy report using the GenerateServiceLastAccessedDetails operation, you can use the JobId parameter in GetServiceLastAccessedDetailsWithEntities. This operation retrieves the status of your report job and a list of entities that could have used group or policy permissions to access the specified service. Group – For a group report, this operation returns a list of users in the group that could have used the group’s policies in an attempt to access the service. Policy – For a policy report, this operation returns a list of entities (users or roles) that could have used the policy in an attempt to access the service. You can also use this operation for user or role reports to retrieve details about those entities.
|
Data Source: Cloud Service Account
Data Component: Cloud Service Account Metadata
|
GetServiceLinkedRoleDeletionStatus
Retrieves the status of your service-linked role deletion.
|
Data Source: Cloud Service Account
Data Component: Cloud Service Account Access
|
GetUser
Retrieves information about the specified IAM user, including the user’s creation date, path, unique ID, and ARN.
|
Data Source: User Account
Data Component: User Account Access
|
GetUserPolicy
Retrieves the specified inline policy document that is embedded in the specified IAM user.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListAccessKeys
Returns information about the access key IDs associated with the specified IAM user. If there is none, the operation returns an empty list.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListAccountAliases
Lists the account alias associated with the AWS account (Note: you can have only one).
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListAttachedGroupPolicies
Lists all managed policies that are attached to the specified IAM group.
|
Data Source: Group
Data Component: Group Enumeration
|
ListAttachedRolePolicies
Lists all managed policies that are attached to the specified IAM role.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListAttachedUserPolicies
Lists all managed policies that are attached to the specified IAM user.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListEntitiesForPolicy
Lists all IAM users, groups, and roles that the specified managed policy is attached to.
|
Data Source: Group
Data Component: Group Metadata
|
ListEntitiesForPolicy
Lists all IAM users, groups, and roles that the specified managed policy is attached to.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListGroupPolicies
Lists the names of the inline policies that are embedded in the specified IAM group.
|
Data Source: Group
Data Component: Group Enumeration
|
ListGroups
Lists the IAM groups that have the specified path prefix.
|
Data Source: Group
Data Component: Group Enumeration
|
ListGroupsForUser
Lists the IAM groups that the specified IAM user belongs to.
|
Data Source: Group
Data Component: Group Enumeration
|
ListInstanceProfileTags
Lists the tags that are attached to the specified IAM instance profile. The returned list of tags is sorted by tag key.
|
Data Source: Instance
Data Component: Instance Metadata
|
ListInstanceProfiles
Lists the instance profiles that have the specified path prefix. If there are none, the operation returns an empty list.
|
Data Source: Instance
Data Component: Instance Metadata
|
ListInstanceProfilesForRole
Lists the instance profiles that have the specified associated IAM role. If there are none, the operation returns an empty list.
|
Data Source: Instance
Data Component: Instance Metadata
|
ListMFADeviceTags
Lists the tags that are attached to the specified IAM virtual multi-factor authentication (MFA) device. The returned list of tags is sorted by tag key.
|
Data Source: User Account
Data Component: User Account Authentication
|
ListMFADevices
Lists the MFA devices for an IAM user. If the request includes a IAM user name, then this operation lists all the MFA devices associated with the specified user. If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request for this operation.
|
Data Source: User Account
Data Component: User Account Authentication
|
ListOpenIDConnectProviderTags
Lists the tags that are attached to the specified OpenID Connect (OIDC)-compatible identity provider. The returned list of tags is sorted by tag key.
|
Data Source: Active Directory
Data Component: Active Directory Object Enumeration
|
ListOpenIDConnectProviders
Lists information about the IAM OpenID Connect (OIDC) provider resource objects defined in the AWS account.
|
Data Source: Active Directory
Data Component: Active Directory Object Enumeration
|
ListPolicies
Lists all the managed policies that are available in your AWS account, including your own customer-defined managed policies and all AWS managed policies.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListPoliciesGrantingServiceAccess
Retrieves a list of policies that the IAM identity (user, group, or role) can use to access each specified service. The list of policies returned by the operation depends on the ARN of the identity that you provide.
|
Data Source: Group
Data Component: Group Metadata
|
ListPoliciesGrantingServiceAccess
Retrieves a list of policies that the IAM identity (user, group, or role) can use to access each specified service. The list of policies returned by the operation depends on the ARN of the identity that you provide.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListPolicyTags
Lists the tags that are attached to the specified IAM customer managed policy. The returned list of tags is sorted by tag key.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListPolicyVersions
Lists information about the versions of the specified managed policy, including the version that is currently set as the policy’s default version.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListRolePolicies
Lists the names of the inline policies that are embedded in the specified IAM role.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListRoleTags
Lists the tags that are attached to the specified role. The returned list of tags is sorted by tag key.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListRoles
Lists the IAM roles that have the specified path prefix. If there are none, the operation returns an empty list.
|
Data Source: User Account
Data Component: User Account Metadata
|
ListSAMLProviderTags
Lists the tags that are attached to the specified Security Assertion Markup Language (SAML) identity provider. The returned list of tags is sorted by tag key.
|
Data Source: Active Directory
Data Component: Active Directory Object Enumeration
|
ListSAMLProviders
Lists the SAML provider resource objects defined in IAM in the account.
|
Data Source: Active Directory
Data Component: Active Directory Object Enumeration
|
ListSSHPublicKeys
Returns information about the SSH public keys associated with the specified IAM user. If none exists, the operation returns an empty list.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListServerCertificates
Lists the server certificates stored in IAM that have the specified path prefix. If none exist, the operation returns an empty list.
|
Data Source: Certificate
Data Component: Certificate Enumeration
|
ListServiceSpecificCredentials
Returns information about the service-specific credentials associated with the specified IAM user. If none exists, the operation returns an empty list. The service-specific credentials returned by this operation are used only for authenticating the IAM user to a specific service.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListSigningCertificates
Returns information about the signing certificates associated with the specified IAM user. If none exists, the operation returns an empty list.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListUserPolicies
Lists the names of the inline policies embedded in the specified IAM user.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListUserTags
Lists the tags that are attached to the specified IAM user. The returned list of tags is sorted by tag key.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListUsers
Lists the IAM users that have the specified path prefix. If no path prefix is specified, the operation returns all users in the AWS account.
|
Data Source: User Account
Data Component: User Account Enumeration
|
ListVirtualMFADevices
Lists the virtual MFA devices defined in the AWS account by assignment status. If you do not specify an assignment status, the operation returns a list of all virtual MFA devices.
|
Data Source: User Account
Data Component: User Account Authentication
|
ModifyImageAttribute
Modifies the specified attribute of the specified AMI. You can specify only one attribute at a time.
|
Data Source: Image
Data Component: Image Modification
|
ModifySnapshotAttribute
Adds or removes permission settings for the specified snapshot. You may add or remove specified AWS account IDs from a snapshot’s list of create volume permissions, but you cannot do both in a single operation.
|
Data Source: Snapshot
Data Component: Snapshot Modification
|
ModifyVolume
You can modify several parameters of an existing EBS volume, including volume size, volume type, and IOPS capacity.
|
Data Source: Volume
Data Component: Volume Modification
|
PutGroupPolicy
A policy for an IAM group has been added or updated.
|
Data Source: Group
Data Component: Group Metadata
|
PutGroupPolicy
Adds or updates an inline policy document that is embedded in the specified IAM group.
|
Data Source: Group
Data Component: Group Metadata
|
PutRolePermissionsBoundary
Adds or updates the policy that is specified as the IAM role’s permissions boundary. You can use an AWS managed policy or a customer managed policy to set the boundary for a role. Use the boundary to control the maximum permissions that the role can have. Setting a permissions boundary is an advanced feature that can affect the permissions for the role.
|
Data Source: User Account
Data Component: User Account Metadata
|
PutRolePolicy
A policy for an IAM role has been added or updated.
|
Data Source: User Account
Data Component: User Account Metadata
|
PutRolePolicy
Adds or updates an inline policy document that is embedded in the specified IAM role.
|
Data Source: User Account
Data Component: User Account Metadata
|
PutUserPermissionsBoundary
Adds or updates the policy that is specified as the IAM user’s permissions boundary. You can use an AWS managed policy or a customer managed policy to set the boundary for a user. Use the boundary to control the maximum permissions that the user can have. Setting a permissions boundary is an advanced feature that can affect the permissions for the user.
|
Data Source: User Account
Data Component: User Account Metadata
|
PutUserPolicy
A policy for an IAM user has been added or updated.
|
Data Source: User Account
Data Component: User Account Metadata
|
PutUserPolicy
Adds or updates an inline policy document that is embedded in the specified IAM role.
|
Data Source: User Account
Data Component: User Account Metadata
|
RemoveClientIDFromOpenIDConnectProvider
Removes the specified client ID (also known as audience) from the list of client IDs registered for the specified IAM OpenID Connect (OIDC) provider resource object.
|
Data Source: Active Directory
Data Component: Active Directory Object Modification
|
RemoveRoleFromInstanceProfile
An IAM role has been removed from an EC2 instance profile.
|
Data Source: Instance
Data Component: Instance Metadata
|
RemoveUserFromGroup
A user has been removed from an IAM group.
|
Data Source: Group
Data Component: Group Modification
|
ResetServiceSpecificCredential
Resets the password for a service-specific credential. The new password is AWS generated and cryptographically strong. It cannot be configured by the user. Resetting the password immediately invalidates the previous password associated with this user.
|
Data Source: Cloud Service Account
Data Component: Cloud Service Account Metadata
|
ResyncMFADevice
Synchronizes the specified MFA device with its IAM resource object on the AWS servers.
|
Data Source: User Account
Data Component: User Account Authentication
|
RunInstances
An Instance has been launched. From the associated metadata you’ll be able to determine who the owner is, what regions the resources are in, the InstanceType and more.
|
Data Source: Instance
Data Component: Instance Start
|
SetDefaultPolicyVersion
A version of a policy has been set as a default. This can apply to users, groups and roles. To find specifics, use the ListEntitiesForPolicy API.
|
Data Source: User Account
Data Component: User Account Metadata
|
SetSecurityTokenPreferences
Sets the specified version of the global endpoint token as the token version used for the AWS account.
|
Data Source: User Account
Data Component: User Account Modification
|
SimulateCustomPolicy
Simulate how a set of IAM policies and optionally a resource-based policy works with a list of API operations and AWS resources to determine the policies’ effective permissions. The policies are provided as strings.
|
Data Source: User Account
Data Component: User Account Metadata
|
SimulatePrincipalPolicy
Simulate how a set of IAM policies attached to an IAM entity works with a list of API operations and AWS resources to determine the policies’ effective permissions. The entity can be an IAM user, group, or role. If you specify a user, then the simulation also includes all of the policies that are attached to groups that the user belongs to. You can simulate resources that don’t exist in your account.
|
Data Source: User Account
Data Component: User Account Metadata
|
StartInstances
An instance has been started. Similar metadata to RunInstances will give you an insight into more detail.
|
Data Source: Instance
Data Component: Instance Start
|
StopInstances
Stops an Amazon EBS-backed instance. Similar to StartInstances and RunInstances.
|
Data Source: Instance
Data Component: Instance Stop
|
StopLogging
CloudTrail has stopped recording CloudTrail Events. This is a significant red flag and should almost always be avoided.
|
Data Source: Cloud Service
Data Component: Cloud Service Disable
|
TagInstanceProfile
Adds one or more tags to an IAM instance profile. If a tag with the same key name already exists, then that tag is overwritten with the new value.
|
Data Source: Instance
Data Component: Instance Metadata
|
TagMFADevice
Adds one or more tags to an IAM virtual multi-factor authentication (MFA) device. If a tag with the same key name already exists, then that tag is overwritten with the new value.
|
Data Source: User Account
Data Component: User Account Authentication
|
TagOpenIDConnectProvider
Adds one or more tags to an OpenID Connect (OIDC)-compatible identity provider.
|
Data Source: Active Directory
Data Component: Active Directory Object Modification
|
TagPolicy
Adds one or more tags to an IAM customer managed policy. If a tag with the same key name already exists, then that tag is overwritten with the new value.
|
Data Source: User Account
Data Component: User Account Metadata
|
TagRole
Adds one or more tags to an IAM role. The role can be a regular role or a service-linked role. If a tag with the same key name already exists, then that tag is overwritten with the new value.
|
Data Source: User Account
Data Component: User Account Metadata
|
TagSAMLProvider
Adds one or more tags to a Security Assertion Markup Language (SAML) identity provider.
|
Data Source: Active Directory
Data Component: Active Directory Object Modification
|
TagServerCertificate
Adds one or more tags to an IAM server certificate. If a tag with the same key name already exists, then that tag is overwritten with the new value.
|
Data Source: Certificate
Data Component: Certificate Modification
|
TagUser
Adds one or more tags to an IAM user. If a tag with the same key name already exists, then that tag is overwritten with the new value.
|
Data Source: User Account
Data Component: User Account Modification
|
Untag Policy
Removes the specified tags from the customer managed policy.
|
Data Source: User Account
Data Component: User Account Metadata
|
UntagInstanceProfile
Removes the specified tags from the IAM instance profile.
|
Data Source: Instance
Data Component: Instance Metadata
|
UntagMFADevice
Removes the specified tags from the IAM virtual multi-factor authentication (MFA) device.
|
Data Source: User Account
Data Component: User Account Authentication
|
UntagOpenIDConnectProvider
Removes the specified tags from the specified OpenID Connect (OIDC)-compatible identity provider in IAM.
|
Data Source: Active Directory
Data Component: Active Directory Object Modification
|
UntagRole
Removes the specified tags from the role.
|
Data Source: User Account
Data Component: User Account Metadata
|
UntagSAMLProvider
Removes the specified tags from the specified Security Assertion Markup Language (SAML) identity provider in IAM.
|
Data Source: Active Directory
Data Component: Active Directory Object Modification
|
UntagServerCertificate
Removes the specified tags from the IAM server certificate.
|
Data Source: Certificate
Data Component: Certificate Modification
|
UntagUser
Removes the specified tags from the user.
|
Data Source: User Account
Data Component: User Account Modification
|
UpdateAccessKey
Changes the status of the specified access key from Active to Inactive, or vice versa. This operation can be used to disable a user’s key as part of a key rotation workflow.
|
Data Source: User Account
Data Component: User Account Modification
|
UpdateAccountPasswordPolicy
Updates the password policy settings for the AWS account.
|
Data Source: User Account
Data Component: User Account Metadata
|
UpdateAssumeRolePolicy
Updates the policy that grants an IAM entity permission to assume a role.
|
Data Source: User Account
Data Component: User Account Metadata
|
UpdateGroup
Updates the name and/or the path of the specified IAM group.
|
Data Source: Group
Data Component: Group Modification
|
UpdateLoginProfile
Changes the password for the specified IAM user.
|
Data Source: User Account
Data Component: User Account Metadata
|
UpdateOpenIDConnectProviderThumbprint
Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints.
|
Data Source: Active Directory
Data Component: Active Directory Object Modification
|
UpdateRole
Updates the description or maximum session duration setting of a role.
|
Data Source: User Account
Data Component: User Account Metadata
|
UpdateSAMLProvider
Updates the metadata document for an existing SAML provider resource object.
|
Data Source: Active Directory
Data Component: Active Directory Object Modification
|
UpdateSSHPublicKey
Sets the status of an IAM user’s SSH public key to active or inactive. SSH public keys that are inactive cannot be used for authentication. This operation can be used to disable a user’s SSH public key as part of a key rotation work flow.
|
Data Source: User Account
Data Component: User Account Modification
|
UpdateServerCertificate
Updates the name and/or the path of the specified server certificate stored in IAM.
|
Data Source: Certificate
Data Component: Certificate Modification
|
UpdateServiceSpecificCredential
Sets the status of a service-specific credential to Active or Inactive. Service-specific credentials that are inactive cannot be used for authentication to the service. This operation can be used to disable a user’s service-specific credential as part of a credential rotation work flow.
|
Data Source: User Account
Data Component: User Account Modification
|
UpdateSigningCertificate
Changes the status of the specified user signing certificate from active to disabled, or vice versa. This operation can be used to disable an IAM user’s signing certificate as part of a certificate rotation work flow.
|
Data Source: User Account
Data Component: User Account Modification
|
UpdateUser
Updates the name and/or the path of the specified IAM user.
|
Data Source: User Account
Data Component: User Account Modification
|
UploadSSHPublicKey
Uploads an SSH public key and associates it with the specified IAM user.
|
Data Source: User Account
Data Component: User Account Modification
|
UploadServerCertificate
Uploads a server certificate entity for the AWS account. The server certificate entity includes a public key certificate, a private key, and an optional certificate chain, which should all be PEM-encoded.
|
Data Source: User Account
Data Component: User Account Modification
|
UploadSigningCertificate
Uploads an X.509 signing certificate and associates it with the specified IAM user.
|
Data Source: User Account
Data Component: User Account Modification
|