[New Rule] AWS EFS File System or Mount Deleted (#1462)

* AWS EFS File System or Mount Deleted

* Update impact_efs_filesystem_or_mount_deleted.toml

* Update rules/integrations/aws/impact_efs_filesystem_or_mount_deleted.toml

Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>

* Update impact_efs_filesystem_or_mount_deleted.toml

* Update impact_efs_filesystem_or_mount_deleted.toml

* Update impact_efs_filesystem_or_mount_deleted.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>
Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com>
This commit is contained in:
Austin Songer
2021-10-15 21:23:07 -05:00
committed by GitHub
parent 702524b1f7
commit 2c39bb962f
@@ -0,0 +1,58 @@
[metadata]
creation_date = "2021/08/27"
maturity = "production"
updated_date = "2021/10/15"
integration = "aws"
[rule]
author = ["Austin Songer"]
description = """
Detects when a EFS File System or Mount is deleted. An adversary could break any file system using the mount target that
is being deleted, which might disrupt instances or applications using those mounts. The mount must be deleted prior to
deleting the File System, or the adversary will be unable to delete the File System.
"""
false_positives = [
"""
File System or Mount being deleted may be performed by a system administrator. Verify whether the user identity,
user agent, and/or hostname should be making changes in your environment. File System Mount deleted from unfamiliar
users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
""",
]
from = "now-60m"
index = ["filebeat-*", "logs-aws*"]
interval = "10m"
language = "kuery"
license = "Elastic License v2"
name = "AWS EFS File System or Mount Deleted"
note = """## Config
The AWS Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
references = [
"https://docs.aws.amazon.com/efs/latest/ug/API_DeleteFileSystem.html",
"https://docs.aws.amazon.com/efs/latest/ug/API_DeleteMountTarget.html",
]
risk_score = 47
rule_id = "536997f7-ae73-447d-a12d-bff1e8f5f0a0"
severity = "medium"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Data Protection"]
timestamp_override = "event.ingested"
type = "query"
query = '''
event.dataset:aws.cloudtrail and event.provider:elasticfilesystem.amazonaws.com and
event.action:(DeleteMountTarget or DeleteFileSystem) and event.outcome:success
'''
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1485"
name = "Data Destruction"
reference = "https://attack.mitre.org/techniques/T1485/"
[rule.threat.tactic]
id = "TA0040"
name = "Impact"
reference = "https://attack.mitre.org/tactics/TA0040/"