<  Back to rules search

AWS EventBridge rule disabled or deleted






Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.


Detect when an attacker is trying to evade defenses by deleting or disabling EventBridge rules.


This rule lets you monitor these CloudTrail API calls to detect if an attacker is modifying or disabling EventBridge rules:

Triage and response

  1. Determine if the arn: {{@userIdentity.arn}} should have made the {{@evt.name}} API call.
  2. Contact the user to see if they intended to make this API call.
  3. If the user did not make the API call:
  • Rotate the credentials.
  • Investigate if the same credentials made other unauthorized API calls.

NOTE: Your organization should tune out user agents that are valid and triggering this signal. To do this, see our Fine-tune security signals to reduce noise blog.


4 April 2022 - Rule query, options and signal markdown updated.