heroui logo

AWS Bucket Deleted

Sigma Rules

View Source
Summary
This detection rule is designed to identify the deletion of Amazon S3 buckets as recorded in AWS CloudTrail logs. Deleting S3 buckets can signify potential data loss or unauthorized access, making it critical to monitor these events closely. The rule triggers when it detects the `DeleteBucket` event name and checks the `errorCode` to confirm that the operation was successful or to see if it was attempted but nullified by an error condition. If either of these conditions occurs, it indicates that a bucket deletion has taken place, which should be flagged for further investigation. The rule also considers the possibility of false positives, particularly during maintenance or legitimate administrative activities where authorized users might delete buckets in a controlled environment. Given the sensitivity of the operation, the rule is classified at a medium severity level, enabling timely alerts without overloading the security operations team with alerts from routine maintenance activities.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Network Traffic
Created: 2025-10-19