AWS Security Hub disabled

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when a user disables AWS Security Hub.

Strategy

This rule lets you monitor this CloudTrail API call to detect if a user has disabled AWS Security Hub:

Triage and response

  1. Determine if {{@userIdentity.arn}} is expected to perform the {{@evt.name}} API call on the account: {{@userIdentity.accountId}}.
  2. Contact the principal owner and see if this was an API call that was made by the user.
  3. If the API call was not made by the user, rotate the user credentials and investigate what other APIs were successfully accessed.
    • Rotate the credentials.
    • Investigate if the same credentials made other unauthorized API calls.

Changelog

  • 7 April 2022 - Updated rule query and signal message.
  • 20 January 2022 - Updated rule severity.
PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data