Skip to content

Commit ad600a3

Browse files
imays11tradebot-elastic
authored andcommitted
[Rule Deprecations] AWS RDS Lifecycle Rules and Outdated APIs (#5350)
#### Deprecate RDS DB Instance/Cluster lifecycle detections `CreateDBInstance`, `CreateDBCluster`, `StopDBInstance`, `StopDBCluster`. These events occur frequently in normal workflows and do not reflect known attacker techniques. They are simply RDS lifecycle operations, with no real impact from an attacker-target perspective. These actions don't have a meaningful benefit for an attacker or cause a meaningful impact for a target. Threat activity around RDS is typically centered around snapshot sharing, export, and public exposure, which is already covered by other rules. There is also a theoretical case to be made for detecting destructive actions against RDS resources like `instance|cluster|snapshot Deletion`, this is covered by other rules. Removing these creation and stoppage rules reduces noise and keeps the AWS ruleset more aligned with real threat surfaces rather than infrastructure management. #### Deprecate Outdated DBSecurityGroup API rules `CreateDBSecurityGroup` and `DeleteDBSecurityGroup` were only used by RDS deployments on EC2-Classic, which AWS has fully retired. Modern RDS uses VPC Security Groups, making these APIs obsolete. These rules can no longer trigger and provide no threat-detection value. Network-permission manipulation is fully covered by our existing VPC Security Group rule - "AWS EC2 Security Group Configuration Change". (cherry picked from commit d6ed1cd)
1 parent d6e7a42 commit ad600a3

File tree

5 files changed

+27
-17
lines changed

5 files changed

+27
-17
lines changed

rules/integrations/aws/impact_rds_group_deletion.toml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,16 @@
22
creation_date = "2021/06/05"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/11/21"
66

77
[rule]
88
author = ["Elastic", "Austin Songer"]
9-
description = "Identifies the deletion of an Amazon Relational Database Service (RDS) Security group."
9+
description = """
10+
Identifies the deletion of an Amazon Relational Database Service (RDS) Security group. Modern RDS deployments run in a
11+
VPC and use standard EC2 security groups instead. This rule should be retained only for historical log analysis on
12+
legacy CloudTrail data. We recommend relying on "AWS EC2 Security Group Configuration Change" rule for network-control
13+
changes impacting RDS in VPC-based deployments.
14+
"""
1015
false_positives = [
1116
"""
1217
An RDS security group deletion may be done by a system or network administrator. Verify whether the user identity,
@@ -20,13 +25,13 @@ index = ["filebeat-*", "logs-aws.cloudtrail-*"]
2025
interval = "10m"
2126
language = "kuery"
2227
license = "Elastic License v2"
23-
name = "AWS RDS Security Group Deletion"
28+
name = "Deprecated - AWS RDS Security Group Deletion"
2429
note = """## Triage and analysis
2530
2631
> **Disclaimer**:
2732
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
2833
29-
### Investigating AWS RDS Security Group Deletion
34+
### Investigating Deprecated - AWS RDS Security Group Deletion
3035
3136
Amazon RDS Security Groups control access to RDS instances, acting as a virtual firewall. Adversaries may delete these groups to disrupt database access or cover their tracks. The detection rule monitors AWS CloudTrail logs for successful deletion events of RDS Security Groups, signaling potential unauthorized activity. This helps security analysts quickly identify and respond to suspicious deletions.
3237

rules/integrations/aws/impact_rds_instance_cluster_stoppage.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/05/20"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/11/21"
66

77
[rule]
88
author = ["Elastic"]
@@ -19,13 +19,13 @@ index = ["filebeat-*", "logs-aws.cloudtrail-*"]
1919
interval = "10m"
2020
language = "kuery"
2121
license = "Elastic License v2"
22-
name = "AWS RDS Instance/Cluster Stoppage"
22+
name = "Deprecated - AWS RDS Instance/Cluster Stoppage"
2323
note = """## Triage and analysis
2424
2525
> **Disclaimer**:
2626
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
2727
28-
### Investigating AWS RDS Instance/Cluster Stoppage
28+
### Investigating Deprecated - AWS RDS Instance/Cluster Stoppage
2929
3030
Amazon RDS is a managed database service that simplifies database setup, operation, and scaling. Adversaries may stop RDS instances or clusters to disrupt services, potentially causing data unavailability or loss. The detection rule monitors AWS CloudTrail logs for successful stop actions on RDS resources, alerting analysts to potential unauthorized disruptions aligned with impact tactics.
3131

rules/integrations/aws/persistence_rds_cluster_creation.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/05/20"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/11/21"
66

77
[rule]
88
author = ["Elastic"]
@@ -22,13 +22,13 @@ index = ["filebeat-*", "logs-aws.cloudtrail-*"]
2222
interval = "10m"
2323
language = "kuery"
2424
license = "Elastic License v2"
25-
name = "AWS RDS Cluster Creation"
25+
name = "Deprecated - AWS RDS Cluster Creation"
2626
note = """## Triage and analysis
2727
2828
> **Disclaimer**:
2929
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
3030
31-
### Investigating AWS RDS Cluster Creation
31+
### Investigating Deprecated - AWS RDS Cluster Creation
3232
3333
Amazon RDS facilitates database management by automating tasks like hardware provisioning and backups. Adversaries may exploit RDS by creating unauthorized clusters to exfiltrate data or establish persistence. The detection rule monitors successful creation events of RDS clusters, flagging potential misuse by correlating specific actions and outcomes, thus aiding in identifying unauthorized activities.
3434

rules/integrations/aws/persistence_rds_group_creation.toml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,16 @@
22
creation_date = "2021/06/05"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/11/21"
66

77
[rule]
88
author = ["Elastic", "Austin Songer"]
9-
description = "Identifies the creation of an Amazon Relational Database Service (RDS) Security group."
9+
description = """
10+
Identifies the creation of an Amazon Relational Database Service (RDS) Security group. Modern RDS deployments run in a
11+
VPC and use standard EC2 security groups instead. This rule should be retained only for historical log analysis on
12+
legacy CloudTrail data. We recommend relying on "AWS EC2 Security Group Configuration Change" rule for network-control
13+
changes impacting RDS in VPC-based deployments.
14+
"""
1015
false_positives = [
1116
"""
1217
An RDS security group may be created by a system or network administrator. Verify whether the user identity, user
@@ -19,13 +24,13 @@ index = ["filebeat-*", "logs-aws.cloudtrail-*"]
1924
interval = "10m"
2025
language = "kuery"
2126
license = "Elastic License v2"
22-
name = "AWS RDS Security Group Creation"
27+
name = "Deprecated - AWS RDS Security Group Creation"
2328
note = """## Triage and analysis
2429
2530
> **Disclaimer**:
2631
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
2732
28-
### Investigating AWS RDS Security Group Creation
33+
### Investigating Deprecated - AWS RDS Security Group Creation
2934
3035
Amazon RDS Security Groups control access to RDS instances, acting as virtual firewalls. Adversaries may exploit this by creating unauthorized security groups to maintain persistence or exfiltrate data. The detection rule monitors successful creation events of RDS security groups, flagging potential misuse by correlating specific AWS CloudTrail logs, thus aiding in identifying unauthorized access attempts.
3136

rules/integrations/aws/persistence_rds_instance_creation.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/06/06"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/11/21"
66

77
[rule]
88
author = ["Elastic", "Austin Songer"]
@@ -19,13 +19,13 @@ index = ["filebeat-*", "logs-aws.cloudtrail-*"]
1919
interval = "10m"
2020
language = "kuery"
2121
license = "Elastic License v2"
22-
name = "AWS RDS Instance Creation"
22+
name = "Deprecated - AWS RDS Instance Creation"
2323
note = """## Triage and analysis
2424
2525
> **Disclaimer**:
2626
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
2727
28-
### Investigating AWS RDS Instance Creation
28+
### Investigating Deprecated - AWS RDS Instance Creation
2929
3030
Amazon RDS simplifies database management by automating tasks like provisioning and scaling. However, adversaries may exploit this by creating unauthorized instances to exfiltrate data or establish persistence. The detection rule monitors successful RDS instance creations, focusing on specific AWS CloudTrail events, to identify potential misuse and ensure asset visibility.
3131

0 commit comments

Comments
 (0)