AWS Route53 private hosted zone associated with a VPC
Identifies when a Route53 private hosted zone has been associated with VPC.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/07/19"
3integration = ["aws"]
4maturity = "production"
5updated_date = "2024/05/21"
6
7[rule]
8author = ["Austin Songer"]
9description = "Identifies when a Route53 private hosted zone has been associated with VPC."
10false_positives = [
11 """
12 A private hosted zone may be asssociated with a VPC by a system or network administrator. Verify whether the user
13 identity, user agent, and/or hostname should be making changes in your environment. If known behavior is causing
14 false positives, it can be exempted from the rule.
15 """,
16]
17from = "now-60m"
18index = ["filebeat-*", "logs-aws.cloudtrail-*"]
19interval = "10m"
20language = "kuery"
21license = "Elastic License v2"
22name = "AWS Route53 private hosted zone associated with a VPC"
23note = """## Setup
24
25The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
26references = ["https://docs.aws.amazon.com/Route53/latest/APIReference/API_AssociateVPCWithHostedZone.html"]
27risk_score = 21
28rule_id = "e3c27562-709a-42bd-82f2-3ed926cced19"
29severity = "low"
30tags = [
31 "Domain: Cloud",
32 "Data Source: AWS",
33 "Data Source: Amazon Web Services",
34 "Data Source: AWS Route53",
35 "Use Case: Asset Visibility",
36 "Tactic: Persistence",
37]
38timestamp_override = "event.ingested"
39type = "query"
40
41query = '''
42event.dataset:aws.cloudtrail and event.provider:route53.amazonaws.com and event.action:AssociateVPCWithHostedZone and
43event.outcome:success
44'''
45
46
47[[rule.threat]]
48framework = "MITRE ATT&CK"
49[[rule.threat.technique]]
50id = "T1098"
51name = "Account Manipulation"
52reference = "https://attack.mitre.org/techniques/T1098/"
53
54
55[rule.threat.tactic]
56id = "TA0003"
57name = "Persistence"
58reference = "https://attack.mitre.org/tactics/TA0003/"
Setup
The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
References
Related rules
- AWS Route 53 Domain Transfer Lock Disabled
- AWS Route 53 Domain Transferred to Another Account
- AWS RDS Cluster Creation
- AWS RDS Instance Creation
- AWS Redshift Cluster Creation