AWS EventBridge rule disabled or deleted

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when an attacker is trying to evade defenses by deleting or disabling EventBridge rules.

Strategy

This rule lets you monitor these CloudTrail API calls to detect if an attacker is modifying or disabling EventBridge rules:

Triage and response

  1. Determine if the arn: {{@userIdentity.arn}} should have made the {{@evt.name}} API call.
  2. Contact the user to see if they intended to make this API call.
  3. If the user did not make the API call:
    • Rotate the credentials.
    • Investigate if the same credentials made other unauthorized API calls.

NOTE: Your organization should tune out user agents that are valid and triggering this signal. To do this, see our Fine-tune security signals to reduce noise blog.

Changelog

4 April 2022 - Updated rule query, options, and signal markdown.

PREVIEWING: rtrieu/product-analytics-ui-changes