Skip to content

Commit

Permalink
autogen docs
Browse files Browse the repository at this point in the history
  • Loading branch information
christophetd committed May 1, 2024
1 parent a018518 commit bad7bc3
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Deletes a Route53 DNS Resolver query logging configuration. Simulates an attacke

<span style="font-variant: small-caps;">Detonation</span>:

- Delete the DNS logging configuration using <code>route53:DeleteQueryLoggingConfig</code>.
- Delete the DNS logging configuration using <code>route53:DeleteResolverQueryLogConfig.

## Instructions

Expand All @@ -35,6 +35,6 @@ stratus detonate aws.defense-evasion.dns-delete-logs
## Detection


Identify when a DNS logging configuration is deleted, through CloudTrail's <code>DeleteResolverQueryLogConfig</code> event.
Identify when a DNS logging configuration is deleted, through CloudTrail's <code>DeleteResolverQueryLogConfig event.


Original file line number Diff line number Diff line change
Expand Up @@ -29,9 +29,9 @@ Warm-up:
Detonation:
- Delete the DNS logging configuration using <code>route53:DeleteQueryLoggingConfig</code>.`,
- Delete the DNS logging configuration using <code>route53:DeleteResolverQueryLogConfig.`,
Detection: `
Identify when a DNS logging configuration is deleted, through CloudTrail's <code>DeleteQueryLoggingConfig</code> event.
Identify when a DNS logging configuration is deleted, through CloudTrail's <code>DeleteResolverQueryLogConfig event.
`,
IsIdempotent: false, // can't delete a DNS logging configuration twice
PrerequisitesTerraformCode: tf,
Expand Down

0 comments on commit bad7bc3

Please sign in to comment.