AWS EventBridge rule disabled or deleted

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when an attacker is trying to evade defenses by deleting or disabling EventBridge rules.

Strategy

This rule lets you monitor these CloudTrail API calls to detect if an attacker is modifying or disabling EventBridge rules:

Triage and response

  1. Determine if the arn: {{@userIdentity.arn}} should have made the {{@evt.name}} API call.
  2. Contact the user to see if they intended to make this API call.
  3. If the user did not make the API call:
    • Rotate the credentials.
    • Investigate if the same credentials made other unauthorized API calls.

NOTE: Your organization should tune out user agents that are valid and triggering this signal. To do this, see our Fine-tune security signals to reduce noise blog.

Changelog

4 April 2022 - Updated rule query, options, and signal markdown.

PREVIEWING: mcretzman/DOCS-9337-add-cloud-info-byoti