
Summary
The ASL AWS IAM Delete Policy detection rule identifies when a policy is deleted within AWS utilizing Amazon Security Lake logs. By monitoring the execution of the DeletePolicy API operation, the rule aims to provide insight into potential unauthorized activities that could compromise security controls. Unauthorized policy deletions can facilitate privilege escalation or grant access to sensitive resources, thus understanding and detecting such actions is vital for maintaining security in AWS environments. To implement this detection mechanism, users must ingest relevant CloudTrail logs captured in Amazon Security Lake into Splunk, leveraging the latest versions of applicable Splunk add-ons. The search query provided captures the DeletePolicy events, offering critical timestamps and user information, enabling the organization to respond proactively to any suspicious deletion events.
Categories
- Cloud
- AWS
Data Sources
- Pod
- Container
- User Account
- Cloud Service
- Cloud Storage
ATT&CK Techniques
- T1098
Created: 2024-11-14