AWS FlowLogs removed
Incident Management が一般に使用できるようになりました。 Incident Management が広範に使用できるようになりました。
<  Back to rules search

AWS FlowLogs removed

cloudtrail

Classification:

attack

Tactic:

Technique:

Set up the cloudtrail integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Overview

Goal

Detect when an attacker is removing FlowLogs to cover their tracks.

Strategy

This rule lets you monitor this CloudTrail API call to detect if an attacker is deleting FlowLogs:

Triage & Response

  1. Determine which user in your organization owns the API key that made this API call.
  2. Contact the user to see if they intended to make this API call.
  3. If the user did not make the API call:
  • Rotate the credentials.
  • Investigate if the same credentials made other unauthorized API calls.