AWS EventBridge Rule Disabled or Deleted
Identifies when a user has disabled or deleted an EventBridge rule. This activity can result in an unintended loss of visibility in applications or a break in the flow with other AWS services.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/10/17"
3integration = ["aws"]
4maturity = "production"
5updated_date = "2024/05/21"
6
7[rule]
8author = ["Austin Songer"]
9description = """
10Identifies when a user has disabled or deleted an EventBridge rule. This activity can result in an unintended loss of
11visibility in applications or a break in the flow with other AWS services.
12"""
13false_positives = [
14 """
15 EventBridge Rules could be deleted or disabled by a system administrator. Verify whether the user identity, user
16 agent, and/or hostname should be making changes in your environment. EventBridge Rules being deleted or disabled by
17 unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the
18 rule.
19 """,
20]
21from = "now-20m"
22index = ["filebeat-*", "logs-aws.cloudtrail-*"]
23language = "kuery"
24license = "Elastic License v2"
25name = "AWS EventBridge Rule Disabled or Deleted"
26note = """## Setup
27
28The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
29references = [
30 "https://docs.aws.amazon.com/eventbridge/latest/APIReference/API_DeleteRule.html",
31 "https://docs.aws.amazon.com/eventbridge/latest/APIReference/API_DisableRule.html",
32]
33risk_score = 21
34rule_id = "87594192-4539-4bc4-8543-23bc3d5bd2b4"
35severity = "low"
36tags = ["Domain: Cloud", "Data Source: AWS", "Data Source: Amazon Web Services", "Tactic: Impact"]
37timestamp_override = "event.ingested"
38type = "query"
39
40query = '''
41event.dataset:aws.cloudtrail and event.provider:eventbridge.amazonaws.com and event.action:(DeleteRule or DisableRule) and
42event.outcome:success
43'''
44
45
46[[rule.threat]]
47framework = "MITRE ATT&CK"
48[[rule.threat.technique]]
49id = "T1489"
50name = "Service Stop"
51reference = "https://attack.mitre.org/techniques/T1489/"
52
53
54[rule.threat.tactic]
55id = "TA0040"
56name = "Impact"
57reference = "https://attack.mitre.org/tactics/TA0040/"
Setup
The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
References
Related rules
- AWS CloudTrail Log Updated
- AWS CloudWatch Log Group Deletion
- AWS CloudWatch Log Stream Deletion
- AWS Deletion of RDS Instance or Cluster
- AWS EC2 Encryption Disabled