IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
AWS Route Table Modified or Deleted
editAWS Route Table Modified or Deleted
editIdentifies when an AWS Route Table has been modified or deleted.
Rule type: query
Rule indices:
- filebeat-*
- logs-aws*
Severity: low
Risk score: 21
Runs every: 10m
Searches indices from: now-60m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References:
- https://github.com/easttimor/aws-incident-response#network-routing
- https://docs.datadoghq.com/security_platform/default_rules/aws-ec2-route-table-modified/
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ReplaceRoute.html
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ReplaceRouteTableAssociation
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DeleteRouteTable.html
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DeleteRoute.html
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DisassociateRouteTable.html
Tags:
- Domain: Cloud
- Data Source: AWS
- Data Source: Amazon Web Services
- Use Case: Network Security Monitoring
- Tactic: Persistence
Version: 105
Rule authors:
- Elastic
- Austin Songer
Rule license: Elastic License v2
Investigation guide
editRule query
editevent.dataset:aws.cloudtrail and event.provider:cloudtrail.amazonaws.com and event.action:(ReplaceRoute or ReplaceRouteTableAssociation or DeleteRouteTable or DeleteRoute or DisassociateRouteTable) and event.outcome:success
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Persistence
- ID: TA0003
- Reference URL: https://attack.mitre.org/tactics/TA0003/