AWS Network ACL Deletion Detected
Detection of AWS Network Access Control List (ACL) deletion via CloudTrail logs indicating potential unauthorized access or data exfiltration.
This analytic identifies the deletion of AWS Network Access Control Lists (ACLs), a critical security control, using AWS CloudTrail logs. The detection focuses on DeleteNetworkAclEntry events, triggered when a user removes a network ACL entry. This is significant because deleting a network ACL can inadvertently or maliciously remove critical access restrictions, potentially opening cloud instances to unauthorized access. The targeted action allows attackers to bypass network security controls, potentially leading to data exfiltration or further compromise of the cloud environment. The detection leverages logs from AWS CloudTrail and requires the AWS App for Splunk (version 5.1.0 or later) and Splunk Add-on for AWS (version 4.4.0 or later).
Attack Chain
- An attacker gains initial access to an AWS account, possibly through compromised credentials or exploiting a vulnerability in an application running on EC2.
- The attacker enumerates existing Network ACLs to identify potential targets for modification or deletion.
- The attacker identifies a Network ACL that, when removed or modified, would grant them broader access to resources within the VPC.
- The attacker uses AWS CLI or AWS Management Console to issue a
DeleteNetworkAclEntrycommand, targeting the chosen ACL. - AWS CloudTrail logs the
DeleteNetworkAclEntryevent, capturing details such as the user identity, timestamp, and affected ACL. - The targeted Network ACL entry is removed, altering the network access rules for the associated subnets.
- The attacker leverages the new network access to connect to previously restricted resources, such as databases or internal applications.
- The attacker exfiltrates sensitive data or performs other malicious activities, bypassing network-level security controls.
Impact
Successful deletion of a network ACL entry can lead to unauthorized access to critical AWS resources, potentially affecting all instances within the affected subnets. The impact can range from data breaches and service disruption to full compromise of the cloud environment, and depends on the scope and importance of the now-exposed resources. This poses a significant threat to organizations utilizing AWS, potentially impacting confidentiality, integrity, and availability.
Recommendation
- Deploy the Sigma rule
AWS Network ACL Entry Deletionto detect instances of ACL entry deletion based onDeleteNetworkAclEntryevents in AWS CloudTrail. - Investigate any detected instances of
DeleteNetworkAclEntryevents, paying close attention to the user identity (user), source IP (src), and the specific ACL being modified. - Enable and review CloudTrail logs regularly to ensure proper coverage of AWS API activity, as indicated in the
data_sourcesection. - Implement multi-factor authentication (MFA) for all AWS accounts to mitigate the risk of compromised credentials leading to unauthorized ACL modifications.
- Implement the
aws_network_access_control_list_deleted_filtermacro to reduce false positives.
Detection coverage 2
AWS Network ACL Entry Deletion
highDetects the deletion of AWS Network ACL entries, which can lead to unauthorized network access.
AWS Network ACL Deleted by User
highDetects a user deleting an entire AWS Network ACL, which can remove critical network access controls.
Detection queries are kept inside the platform. Get full rules →