AWS EventBridge rule disabled or deleted

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when an attacker is trying to evade defenses by deleting or disabling EventBridge rules.

Strategy

This rule lets you monitor these CloudTrail API calls to detect if an attacker is modifying or disabling EventBridge rules:

Triage and response

  1. Determine if the arn: {{@userIdentity.arn}} should have made the {{@evt.name}} API call.
  2. Contact the user to see if they intended to make this API call.
  3. If the user did not make the API call:
    • Rotate the credentials.
    • Investigate if the same credentials made other unauthorized API calls.

NOTE: Your organization should tune out user agents that are valid and triggering this signal. To do this, see our Fine-tune security signals to reduce noise blog.

Changelog

4 April 2022 - Updated rule query, options, and signal markdown.