AWS ECS Cluster Deleted
Security Monitoring is now available Security Monitoring is now available
<  Back to rules search

AWS ECS Cluster Deleted

cloudtrail

Classification:

attack

Tactic:

Technique:

Set up the cloudtrail integration.

Overview

Goal

Detect when an attacker is destroying an ECS Cluster

Strategy

This rule lets you monitor this CloudTrail API call to detect if an ECS cluster is deleted:

Triage & Response

  1. Determine which user in your organization owns the API key that made this API call.
  2. Contact the user to see if they intended to make this API call.
  3. If the user did not make the API call:
    • Rotate the credentials.
    • Investigate if the same credentials made other unauthorized API calls.