Data Encrypted for Impact: RDS Data Encryption


AWS Specific Sub-Technique


Other sub-techniques of Data Encrypted for Impact (3)

A prerequisite for this technique is that a threat actor has already gained access to AWS account credentials with permissions to modify RDS databases and their configurations.

Threat actors can attempt to encrypt data within RDS databases as part of ransom attacks. This can involve directly encrypting database contents, modifying database encryption settings, and potentially deleting database backups to prevent recovery.

Detection

When this technique is used, RDS actions will be logged in CloudTrail. You can use the Event history page in the AWS CloudTrail console to view the last 90 days of events related to RDS actions such as rds:CopyDBSnapshot or rds:DeleteDBSnapshot.

A separate CloudTrail trail will provide an ongoing record of database modification events. Monitor for unexpected patterns such as rapid snapshot deletion, unusual encryption key changes, or multiple database modifications. CloudWatch metric filters can be created to alert on critical RDS API calls, particularly those affecting encryption settings or backup configurations.

Amazon GuardDuty findings may indicate unusual database access patterns or suspicious API calls related to RDS resources. Additionally, GuardDuty RDS Protection detects anomalous login behavior on RDS database instances.


Mitigation

Implement strict IAM policies that limit RDS modification permissions to authorized personnel and require MFA for critical changes. For an example on how to require MFA for deletion, see this AWS blog post. Configure automated backups with appropriate retention periods and implement cross-region backup copies to protect against regional incidents or malicious deletion. For more information about cross-region automated backups, see the AWS documentation here.


AWS Specific Information


AWS Services:
  • RDS
AWS CloudTrail Event Names:
  • rds:CopySnapshot
  • rds:DeleteDBSnapshot

Technique Information

ID: T1486.A003
Aliases: T1486.A003
Sub-technique of: T1486
Tactics:
  • Impact
Platforms:
  • IaaS
  • Amazon Web Services (AWS)
Created: 01 Dec 2025
Last Modified: 01 Dec 2025