This rule monitors for failed AWS changes to EC2 VPCs.
EC2 VPCs have broad control/impact on how network traffic traverses your AWS environment. Changes to these systems should be closely monitored as they could open access to sensitive internal systems to attackers.
If this change was not planned, revert it and investigate the source of the change. Consider modifying permissions to ensure unplanned changes cannot happen again in the future.
CIS AWS Benchmark 3.14: "Ensure a log metric filter and alarm exist for VPC changes"