AWS Route 53 VPC disassociated from query logging configuration

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when a user disassociates a VPC from the query logging configuration.

Strategy

This rule lets you monitor this CloudTrail API call to detect if a user has disassociated.

Triage and response

  1. Determine if {{@userIdentity.arn}} is expected to perform the {{@evt.name}} API call.
  2. Contact the principal owner and see if this was an API call that was made by the user.
  3. If the API call was not made by the user, rotate the user credentials and investigate what other APIs were successfully accessed.
    • Rotate the credentials.
    • Investigate if the same credentials made other unauthorized API calls.

Changelog

  • 7 April 2022 - Update rule and signal message.
  • 15 December 2022 - Update query to include Access Denied events and reduce severity.
PREVIEWING: antoine.dussault/service-representation-ga-docs-us1