heroui logo

Cloud Network Access Control List Deleted

Splunk Security Content

View Source
Summary
The detection rule titled 'Cloud Network Access Control List Deleted' identifies potential unauthorized deletions of network access control lists (ACLs) within a cloud environment, which can expose instances to attacks by allowing unrestricted access. The rule leverages AWS CloudTrail logs to track events specific to the deletion of network ACLs (eventName=DeleteNetworkAcl) by monitoring user activities. When an administrator’s credentials are compromised, an attacker could send a delete request, thus removing access restrictions to the cloud environment. This detection uses the Change data model to aggregate data around the user, counting occurrences and tracking timestamps to identify potentially malicious actions. The rule is deprecated due to being a duplicate of existing functionality.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
  • Network Traffic
Created: 2024-11-14