Loading

AWS RDS DB Instance or Cluster Deleted

Identifies the deletion of an Amazon RDS DB instance, Aurora cluster, or global database cluster. Deleting these resources permanently destroys stored data and can cause major service disruption. Adversaries with sufficient permissions may delete RDS resources to impede recovery, destroy evidence, or inflict operational impact on the environment.

Rule type: query
Rule indices:

  • filebeat-*
  • logs-aws.cloudtrail-*

Rule Severity: medium
Risk Score: 47
Runs every:
Searches indices from: now-6m
Maximum alerts per execution: ?
References:

Tags:

  • Domain: Cloud
  • Data Source: AWS
  • Data Source: Amazon Web Services
  • Data Source: AWS RDS
  • Use Case: Asset Visibility
  • Tactic: Impact
  • Resources: Investigation Guide

Version: ?
Rule authors:

  • Elastic

Rule license: Elastic License v2

Disclaimer: This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, validate and adapt it to suit your operational needs.

This rule detects the deletion of an RDS DB instance, Aurora DB cluster, or global database cluster. These operations permanently remove stored data and backups unless final snapshots are explicitly retained. Adversaries may delete RDS resources as part of a destructive attack, to eliminate forensic evidence, or to disrupt critical workloads. Because deletions are irreversible without backups, immediate review is required to determine whether the action was authorized and assess potential data loss.

Identify the Actor

  • Review aws.cloudtrail.user_identity.arn and aws.cloudtrail.user_identity.access_key_id to determine who performed the action.
  • Validate:
    • Is this user/role authorized to delete DB instances or clusters?
    • Does this action align with past behavior?

Review the Deletion Event

  • Confirm which action was invoked: DeleteDBInstance, DeleteDBCluster or DeleteGlobalCluster
  • Examine aws.cloudtrail.request_parameters and target.entity.id. Identify which resource was deleted and whether a final snapshot was created before deletion.

Analyze Source and Access Context

  • Check source.ip, source.geo fields and user_agent.original
  • Validate whether:
    • The request originated from a known network or VPN.
    • The user normally logs in from this location.
    • The call was made via AWS Console vs CLI vs SDK.

Correlate Surrounding Activity Search CloudTrail for:

  • Recent IAM role or policy changes.
  • Privilege escalation events (STS AssumeRole, CreateAccessKey, AttachUserPolicy).
  • Disablement of related safety controls:
    • deletionProtection modified to false
    • backupRetentionPeriod set to 0
  • Suspicious sequencing:
    • Snapshots deleted before the instance/cluster deletion.
    • Network security group modifications enabling broader access before deletion.

Validate Organizational Intent

  • Contact the service owner or DB administrator to confirm whether the deletion is expected.

Assess Impact and Data Recovery Path

  • Identify which DB instance or cluster was deleted (target.entity.id)
  • Evaluate:
    • Whether automated backups existed.
    • Whether point-in-time recovery is still possible.
    • Whether a final snapshot was created.
  • Planned decommissioning:
    • Confirm if this action aligns with a scheduled removal or environment cleanup.
  • CloudFormation stack deletion:
    • Stack teardown often deletes RDS resources; confirm if this occurred.
  • Automated testing or ephemeral environments:
    • Test/dev pipelines may frequently create and delete clusters.
  • Infrastructure-as-code workflows:
    • Terraform destroys or GitOps cleanup jobs can generate legitimate deletion events.

If the deletion was unauthorized: Immediately restrict the actor

  • Disable or revoke the user’s access keys.
  • Revoke active session tokens.

Attempt recovery

  • Restore from:
    • Final snapshot (if created)
    • Automated backups
  • Rebuild cluster/instance configurations based on IaC or documented templates.

Perform full log review

  • CloudTrail, RDS Enhanced Monitoring, and VPC Flow Logs
  • Identify lateral movement or privilege escalation preceding the deletion.

Scope and contain the incident

  • Determine whether:
    • Additional RDS resources were targeted
    • IAM permissions were modified
    • Other destructive API calls were made

Hardening actions

  • Enable deletionProtection on all critical instances/clusters.
  • Require final snapshot creation for all deletion operations.
  • Enforce MFA for IAM users with RDS privileges.
  • Limit RDS modification/deletion permissions to specific IAM roles.

Documentation and Follow-Up

  • Update incident response runbooks.
  • Communicate with service owners and leadership.
  • Add enhanced monitoring rules around:
    • Snapshot deletions
    • Backup retention modifications
    • RDS role changes
    • DeletionProtection disable events
event.dataset: aws.cloudtrail
    and event.provider: rds.amazonaws.com
    and event.action: (DeleteDBCluster or DeleteGlobalCluster or DeleteDBInstance)
    and event.outcome: success
		

Framework: MITRE ATT&CK