AWS EC2 subnet deleted

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when an attacker is destroying an EC2 subnet.

Strategy

This rule lets you monitor this CloudTrail API call to detect if an attacker is deleting an EC2 subnet.

Triage and response

  1. Determine if {{@userIdentity.arn}} should be deleting EC2 subnets.
  2. Contact the user to see if they intended to make this API call.
  3. If the user did not make the API call:
    • Rotate the credentials.
    • Investigate if the same credentials made other unauthorized API calls.

Changelog

1 April 2022 - Updated rule and signal message.

PREVIEWING: esther/docs-9478-fix-split-after-example