
Summary
The detection rule 'ASL AWS IAM Successful Group Deletion' is designed to monitor AWS IAM group deletion events that are logged through CloudTrail. Deleting a group in AWS Identity and Access Management (IAM) is not inherently malicious; however, this action can indicate preparatory steps for more serious threats, such as unauthorized access or privilege escalation. By logging these deletions, organizations can quickly identify potentially malicious activity that may lead to breaches in their AWS environments. The analytic collects relevant data about the deletion events, including who performed the action, when it took place, and from where, allowing security teams to correlate this information with other security incidents. It emphasizes the need for a proactive approach to AWS resource management and highlights the importance of early detection to mitigate risks associated with unauthorized access to sensitive resources. The rule serves as a preventative measure that allows teams to establish security baselines and respond before an incident escalates.
Categories
- Cloud
- AWS
- Identity Management
Data Sources
- Cloud Storage
- Cloud Service
- Application Log
ATT&CK Techniques
- T1069.003
- T1098
- T1069
Created: 2024-11-14