heroui logo

AWS VPC Flow Logs Deletion

Elastic Detection Rules

View Source
Summary
This rule detects the deletion of VPC (Virtual Private Cloud) flow logs in AWS EC2 using the `DeleteFlowLogs` API action, which may indicate malicious activity aimed at obfuscating network traffic. Flow logs are crucial for monitoring network communication within a VPC, and their deletion could signify an attacker attempting to evade detection by removing potentially incriminating evidence from logs. The rule is set to trigger on successful deletion events within the last 60 minutes, focusing on log data ingested via AWS CloudTrail and Filebeat. False positives may arise from legitimate log rotations or administrative activities, which can be mitigated through verification of user identity and behavior. Recommendations for response include investigating the user's actions, assessing any impact, and implementing remediation steps to secure the environment. The threat is mapped to the MITRE ATT&CK framework under the 'Defense Evasion' tactic (TA0005), specifically technique T1562 (Impair Defenses) and its subtechnique T1562.001 (Disable or Modify Tools).
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1562
  • T1562.001
Created: 2020-06-15