Skip to content

Commit 2ab5338

Browse files
imays11tradebot-elastic
authored andcommitted
[Deprecation] AWS Elasticache Security Group Rules (#5334)
ElastiCache cache security groups are only used with EC2-Classic deployments. AWS officially retired EC2-Classic and no longer supports launching ElastiCache clusters in EC2-Classic networking environments. All modern ElastiCache deployments run in a VPC and rely on standard EC2 security groups (ec2.amazonaws.com APIs) rather than CacheSecurityGroup APIs (elasticache.amazonaws.com). This behavior is covered by this existing rule: - https://github.com/elastic/detection-rules/blob/fe642a879a412db71492f5d776e1e3338a531266/rules/integrations/aws/persistence_ec2_security_group_configuration_change_detection.toml These rules no longer match any behavior in supported AWS environments and so should be deprecated. This PR: - Marks both rules with `Deprecated - ` title to start deprecation process - Updates rule description to clarify that they are only relevant for historical EC2-Classic log analysis. - Recommends relying on the existing EC2 security group rule for network-control changes impacting ElastiCache in VPC-based deployments. I've tested this scenario by creating an Elasticache cluster, creating, and modifying security group rules. Below is a screenshot verifying that the activity is indeed captured by the normal EC2/VPC security group rule. There were no alerts triggered for the "Elasticache Security Group" Rules (cherry picked from commit ba44f43)
1 parent 39dccf9 commit 2ab5338

File tree

2 files changed

+33
-10
lines changed

2 files changed

+33
-10
lines changed

rules/integrations/aws/defense_evasion_elasticache_security_group_creation.toml

Lines changed: 16 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,16 @@
22
creation_date = "2021/07/19"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/11/18"
66

77
[rule]
88
author = ["Austin Songer"]
9-
description = "Identifies when an ElastiCache security group has been created."
9+
description = """
10+
Identifies when an ElastiCache security group has been created. Amazon EC2-Classic and ElastiCache CacheSecurityGroups
11+
have been retired. Modern ElastiCache deployments run in a VPC and use standard EC2 security groups instead. This rule
12+
should be retained only for historical log analysis on legacy CloudTrail data. We recommend relying on "AWS EC2 Security
13+
Group Configuration Change" rule for network-control changes impacting ElastiCache in VPC-based deployments.
14+
"""
1015
false_positives = [
1116
"""
1217
A ElastiCache security group may be created by a system or network administrator. Verify whether the user identity,
@@ -20,13 +25,13 @@ index = ["filebeat-*", "logs-aws.cloudtrail-*"]
2025
interval = "10m"
2126
language = "kuery"
2227
license = "Elastic License v2"
23-
name = "AWS ElastiCache Security Group Created"
28+
name = "Deprecated - AWS ElastiCache Security Group Created"
2429
note = """## Triage and analysis
2530
2631
> **Disclaimer**:
2732
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
2833
29-
### Investigating AWS ElastiCache Security Group Created
34+
### Investigating Deprecated - AWS ElastiCache Security Group Created
3035
3136
AWS ElastiCache security groups control access to cache clusters, ensuring only authorized traffic can interact with them. Adversaries might create new security groups to bypass existing restrictions, facilitating unauthorized access or data exfiltration. The detection rule monitors for successful creation events of these groups, signaling potential defense evasion tactics by identifying unusual or unauthorized configurations.
3237
@@ -66,7 +71,13 @@ references = [
6671
risk_score = 21
6772
rule_id = "7b3da11a-60a2-412e-8aa7-011e1eb9ed47"
6873
severity = "low"
69-
tags = ["Domain: Cloud", "Data Source: AWS", "Data Source: Amazon Web Services", "Tactic: Defense Evasion", "Resources: Investigation Guide"]
74+
tags = [
75+
"Domain: Cloud",
76+
"Data Source: AWS",
77+
"Data Source: Amazon Web Services",
78+
"Tactic: Defense Evasion",
79+
"Resources: Investigation Guide",
80+
]
7081
timestamp_override = "event.ingested"
7182
type = "query"
7283

rules/integrations/aws/defense_evasion_elasticache_security_group_modified_or_deleted.toml

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,17 @@
22
creation_date = "2021/07/19"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/11/18"
66

77
[rule]
88
author = ["Austin Songer"]
9-
description = "Identifies when an ElastiCache security group has been modified or deleted."
9+
description = """
10+
Identifies when an ElastiCache security group has been modified or deleted. Amazon EC2-Classic and ElastiCache
11+
CacheSecurityGroups have been retired. Modern ElastiCache deployments run in a VPC and use standard EC2 security groups
12+
instead. This rule should be retained only for historical log analysis on legacy CloudTrail data. We recommend relying
13+
on "AWS EC2 Security Group Configuration Change" rule for network-control changes impacting ElastiCache in VPC-based
14+
deployments.
15+
"""
1016
false_positives = [
1117
"""
1218
A ElastiCache security group deletion may be done by a system or network administrator. Verify whether the user
@@ -20,13 +26,13 @@ index = ["filebeat-*", "logs-aws.cloudtrail-*"]
2026
interval = "10m"
2127
language = "kuery"
2228
license = "Elastic License v2"
23-
name = "AWS ElastiCache Security Group Modified or Deleted"
29+
name = "Deprecated - AWS ElastiCache Security Group Modified or Deleted"
2430
note = """## Triage and analysis
2531
2632
> **Disclaimer**:
2733
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
2834
29-
### Investigating AWS ElastiCache Security Group Modified or Deleted
35+
### Investigating Deprecated - AWS ElastiCache Security Group Modified or Deleted
3036
3137
AWS ElastiCache security groups control inbound and outbound traffic to cache clusters, ensuring only authorized access. Adversaries may modify or delete these groups to bypass security controls, facilitating unauthorized data access or exfiltration. The detection rule monitors specific API actions related to security group changes, flagging successful modifications or deletions as potential defense evasion attempts.
3238
@@ -64,7 +70,13 @@ references = ["https://docs.aws.amazon.com/AmazonElastiCache/latest/APIReference
6470
risk_score = 21
6571
rule_id = "1ba5160d-f5a2-4624-b0ff-6a1dc55d2516"
6672
severity = "low"
67-
tags = ["Domain: Cloud", "Data Source: AWS", "Data Source: Amazon Web Services", "Tactic: Defense Evasion", "Resources: Investigation Guide"]
73+
tags = [
74+
"Domain: Cloud",
75+
"Data Source: AWS",
76+
"Data Source: Amazon Web Services",
77+
"Tactic: Defense Evasion",
78+
"Resources: Investigation Guide",
79+
]
6880
timestamp_override = "event.ingested"
6981
type = "query"
7082

0 commit comments

Comments
 (0)