diff --git a/rules/cloud/aws_sts_assumedrole_misuse.yml b/rules/cloud/aws_sts_assumedrole_misuse.yml index 869c4f2d..75ecc209 100644 --- a/rules/cloud/aws_sts_assumedrole_misuse.yml +++ b/rules/cloud/aws_sts_assumedrole_misuse.yml @@ -1,5 +1,5 @@ title: AWS STS AssumedRole Misuse -id: b45ab1d2-712f-4f01-a751-df3826969807 +id: 905d389b-b853-46d0-9d3d-dea0d3a3cd49 description: Identifies the suspicious use of AssumedRole. Attackers could move laterally and escalate privileges. author: Austin Songer status: experimental