ba44f43295
ElastiCache cache security groups are only used with EC2-Classic deployments. AWS officially retired EC2-Classic and no longer supports launching ElastiCache clusters in EC2-Classic networking environments. All modern ElastiCache deployments run in a VPC and rely on standard EC2 security groups (ec2.amazonaws.com APIs) rather than CacheSecurityGroup APIs (elasticache.amazonaws.com). This behavior is covered by this existing rule: - https://github.com/elastic/detection-rules/blob/fe642a879a412db71492f5d776e1e3338a531266/rules/integrations/aws/persistence_ec2_security_group_configuration_change_detection.toml These rules no longer match any behavior in supported AWS environments and so should be deprecated. This PR: - Marks both rules with `Deprecated - ` title to start deprecation process - Updates rule description to clarify that they are only relevant for historical EC2-Classic log analysis. - Recommends relying on the existing EC2 security group rule for network-control changes impacting ElastiCache in VPC-based deployments. I've tested this scenario by creating an Elasticache cluster, creating, and modifying security group rules. Below is a screenshot verifying that the activity is indeed captured by the normal EC2/VPC security group rule. There were no alerts triggered for the "Elasticache Security Group" Rules