EXPLORE
← Back to Explore
sigmalowHunting

AWS ElastiCache Security Group Modified or Deleted

Identifies when an ElastiCache security group has been modified or deleted.

MITRE ATT&CK

impact

Detection Query

selection:
  eventSource: elasticache.amazonaws.com
  eventName:
    - DeleteCacheSecurityGroup
    - AuthorizeCacheSecurityGroupIngress
    - RevokeCacheSecurityGroupIngress
    - AuthorizeCacheSecurityGroupEgress
    - RevokeCacheSecurityGroupEgress
condition: selection

Author

Austin Songer @austinsonger

Created

2021-07-24

Data Sources

awscloudtrail

Platforms

aws

Tags

attack.impactattack.t1531
Raw Content
title: AWS ElastiCache Security Group Modified or Deleted
id: 7c797da2-9cf2-4523-ba64-33b06339f0cc
status: test
description: Identifies when an ElastiCache security group has been modified or deleted.
references:
    - https://github.com/elastic/detection-rules/blob/7d5efd68603f42be5e125b5a6a503b2ef3ac0f4e/rules/integrations/aws/impact_elasticache_security_group_modified_or_deleted.toml
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-10-09
tags:
    - attack.impact
    - attack.t1531
logsource:
    product: aws
    service: cloudtrail
detection:
    selection:
        eventSource: elasticache.amazonaws.com
        eventName:
            - 'DeleteCacheSecurityGroup'
            - 'AuthorizeCacheSecurityGroupIngress'
            - 'RevokeCacheSecurityGroupIngress'
            - 'AuthorizeCacheSecurityGroupEgress'
            - 'RevokeCacheSecurityGroupEgress'
    condition: selection
falsepositives:
    - A ElastiCache security group deletion may be done by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. Security Group deletions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.


level: low