AWS Network Access Control List created or modified

cloudtrail

Classification:

compliance

Tactic:

Technique:

Framework:

cis-aws

Control:

4.11

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

Goal

Detect when an AWS Network Access Control List (NACL) has been created, deleted or modified.

Strategy

This rule lets you monitor CloudTrail and detect when an AWS NACL has been created, deleted or modified with one of the following API calls:

Triage and response

  1. Determine if the usr with arn: {{@userIdentity.arn}} should have used the API call: {{@evt.name}}.
  2. Contact the user and see if this API call was made by the user.
  3. If the API call was not made by the user:
    • Rotate the user credentials and investigate what other API calls.
    • Determine what other API calls the user made which were not made by the user.

Changelog

5 April 2022 - Updated Rule queries, cases and signal message.