Modify Cloud Resource Hierarchy: Create or Invite AWS Account


AWS Specific Sub-Technique


Other sub-techniques of Modify Cloud Resource Hierarchy (2)
ID Name
T1666.A001 Create or Invite AWS Account
T1666.A002 Leave AWS Organization

AWS Specific Content


A prerequisite for this technique is that a threat actor has already gained access to the Management account within in AWS Organization as well as control of an AWS identity with the permissions to perform the actions in the Management account in the Event Name(s) section.

With access to an AWS identity that has the appropriate permissions, threat actors may create an account within an AWS organization that will use the payment method registered to the management or payer account. Alternatively, the threat actor can invite a separate AWS account under their control to the AWS Organization. The threat actor will then be able to create resources and workloads within the newly created account that may not be subject to existing detections. By default, Service Control Policies are not assigned to new accounts during the creation of the account within an organization.

Detection

AWS Specific Content


When this technique is used by the threat actor, actions taken by the threat actor using the credentials obtained will be logged in CloudTrail. You can use the Event History page in the AWS CloudTrail console to view the last 90 days of management events in an AWS Region for the events listed in the AWS CloudTrail Event Name(s) section, such as organizations:CreateAccount.

A separate CloudTrail trail will give you an ongoing record of events in your AWS account past 90 days and can be configured to log events in multiple regions. You can also review events using the console as well as the AWS CLI.

It is also possible to create a CloudWatch metric filter to watch for when specific AWS API calls are used and perform notification actions if logged, and additionally configure CloudWatch to automatically perform an action in response to an alarm.

You can also regularly audit the AWS Organizations console for suspicious or unauthorized accounts.


Mitigation

AWS Specific Content


You can make sure that principals are scoped with the least-privileged permissions necessary to perform duties, limiting the ability to perform unauthorized actions in an AWS account when not required. One possible method of applying the principle of least-privileged permissions is to use Service Control Policies to restrict the maximum available permissions for the IAM users and IAM roles within your AWS Organizations accounts (note - you should test SCPs in a development environment before deploying them in production).

You can also use IAM Access Analyzer to regularly review and verify access and manage permissions across your AWS environment, which will highlight AWS identities with excessive permissions and the actions performed by those identities.


AWS Specific Information


AWS Services:
  • AWS Organizations
AWS CloudTrail Event Names:
  • organizations:CreateAccount
  • organizations:InviteAccountToOrganization

Technique Information

ID: T1666.A001
Aliases: T1666.A001, AT1032
Sub-technique of: T1666
Tactics:
  • Persistence
  • Defense Evasion
  • Lateral Movement
Platforms:
  • IaaS
  • AWS
  • Amazon Web Services (AWS)
Created: 25 Sep 2024
Last Modified: 30 May 2025