Extracting group lists from identity systems identifies permissions, roles, or configurations. Adversaries may exploit high-privilege groups or misconfigurations. Examples:
aws iam list-groupsGet-ADGroup -Filter *Get-AzureADGroupGET https://graph.microsoft.com/v1.0/groupsData Collection Measures:
| Name | Channel |
|---|---|
| AWS:CloudTrail | ListGroups, ListAttachedRolePolicies |
| azure:audit | az ad user get-member-groups, Get-AzRoleAssignment |
| gcp:audit | cloudidentity.groups.list |
| saas:github | GET /orgs/:org/teams, GET /teams/:team/members |
| saas:salesforce | GET /services/data/vXX.X/groups |
| ID | Name | Technique Detected |
|---|---|---|
| DET0251 | Behavioral Detection of Cloud Group Enumeration via API and CLI Access | T1069.003 |