heroui logo

ASL AWS Defense Evasion Impair Security Services

Splunk Security Content

View Source
Summary
This detection rule is designed to identify malicious activities within AWS environments, specifically those that aim to impair the functionality of critical security services. This rule alerts administrators to the deletion of vital configurations related to AWS security tools like CloudWatch alarms, GuardDuty detectors, and Web Application Firewall rules. Such actions are often undertaken by attackers who wish to evade detection and disrupt security monitoring capabilities, allowing them to maintain a foothold within the environment without being noticed. The rule utilizes Amazon Security Lake logs to track specific API calls associated with these deletions, such as 'DeleteLogStream' and 'DeleteDetector'. Given that these operations are significant for maintaining security posture in AWS, their unauthorized execution is flagged as a potential security incident, which could lead to data breaches or unauthorized access if not addressed promptly. The implementation of this detection requires ingestion of AWS CloudTrail logs into a Splunk instance, with specific searching techniques employed to correlate and extract relevant data such as user identifiers, originating IP addresses, and timestamps of the events.
Categories
  • Cloud
  • AWS
  • Infrastructure
Data Sources
  • Cloud Storage
ATT&CK Techniques
  • T1562.008
  • T1562
Created: 2024-11-14