heroui logo

AWS Deletion of RDS Instance or Cluster

Elastic Detection Rules

View Source
Summary
The rule detects potential malicious activities focused on the deletion of Amazon RDS Aurora database clusters, global database clusters, or database instances through monitoring AWS CloudTrail logs. By analyzing logs for successful deletion actions, it aims to alert security teams to potential threats. False positives may arise during legitimate administrative deletions, requiring verification of user actions and exception handling for known operational procedures. Investigation steps include reviewing CloudTrail logs for specific event actions, user verification, event correlation with other suspicious activity, and assessing the impact of deletions. In case of unauthorized deletions, immediate action is needed, including account isolation, recovery of deleted databases, thorough log analyses, and improved monitoring protocols. To prevent future incidents, strengthening IAM policies and robust stakeholder communication are recommended.
Categories
  • Cloud
  • AWS
  • Infrastructure
Data Sources
  • Cloud Storage
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1485
Created: 2020-05-21