Cloud Network Access Control List Deleted

Original Source: [splunk source]
Name:Cloud Network Access Control List Deleted
id:021abc51-1862-41dd-ad43-43c739c0a983
version:3
date:2024-10-17
author:Peter Gael, Splunk
status:deprecated
type:Anomaly
Description:Enforcing network-access controls is one of the defensive mechanisms used by cloud administrators to restrict access to a cloud instance. After the attacker has gained control of the console by compromising an admin account, they can delete a network ACL and gain access to the instance from anywhere. This search will query the Change datamodel to detect users deleting network ACLs. Deprecated because it's a duplicate
Data_source:
search:`cloudtrail` eventName=DeleteNetworkAcl|rename userIdentity.arn as arn
| stats count min(_time) as firstTime max(_time) as lastTime values(errorMessage) values(errorCode) values(userAgent) values(userIdentity.*) by src userName arn eventName
| `security_content_ctime(lastTime)`
| `security_content_ctime(firstTime)`
| `cloud_network_access_control_list_deleted_filter`


how_to_implement:You must be ingesting your cloud infrastructure logs from your cloud provider. You can also provide additional filtering for this search by customizing the `cloud_network_access_control_list_deleted_filter` macro.
known_false_positives:It's possible that a user has legitimately deleted a network ACL.
References:
drilldown_searches:
  :
tags:
  analytic_story:
    - 'AWS Network ACL Activity'
  asset_type:Instance
  confidence:50
  impact:50
  message:tbd
  observable:
    name:'userName'
    type:'User'
    - role:
      - 'Victim'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - '_time'
    - 'eventName'
    - 'userIdentity.arn'
    - 'errorMessage'
    - 'errorCode'
    - 'userAgent'
    - 'src'
    - 'userName'
    - 'arn'
  risk_score:25
  security_domain:network

tests:
  :
manual_test:None

Related Analytic Stories


AWS Network ACL Activity