AWS VPC created or modified
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect when an attacker is destroying a VPC.
Strategy
This rule lets you monitor this CloudTrail API call to detect if an attacker is deleting a VPC:
Triage and response
- Determine if
{{@userIdentity.arn}}
is expected to perform the {{@evt.name}}
API call on the account: {{@userIdentity.accountId}}
. - Contact the principal owner and see if this was an API call that was made by the user.
- If the API call was not made by the user, rotate the user credentials and investigate what other APIs were successfully accessed.
- Rotate the credentials.
- Investigate if the same credentials made other unauthorized API calls.
Changelog
7 April 2022 - Updated rule query, cases and signal message.