
Summary
This rule is designed to detect the deletion of Amazon EC2 Network Access Control Lists (ACLs) or their ingress/egress entries. Network ACLs play a crucial role in managing inbound and outbound traffic to subnets within an AWS environment, functioning similarly to a firewall. Unauthorized deletion of these ACLs may indicate attempts by malicious actors to bypass security measures, enabling unauthorized access or data breaches. The rule leverages AWS CloudTrail logs to monitor for successful deletion events, triggering alerts when incidents are detected. Investigators should assess associated user identities, timestamps, and related account activities to ascertain the legitimacy of deletion events and explore any potential malicious intent. A careful analysis of these events, alongside a robust response plan, is essential for maintaining cloud security and integrity.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
ATT&CK Techniques
- T1562
- T1562.001
Created: 2020-05-26