heroui logo

AWS IAM Successful Group Deletion

Splunk Security Content

View Source
Summary
This detection rule focuses on identifying successful deletions of IAM groups in AWS, utilizing CloudTrail logs specifically for `DeleteGroup` events that report success. The underlying rationale for monitoring these events is that unauthorized deletions could indicate an attempt to alter user permissions or access controls, which can pave the way for privilege escalation or unauthorized access to sensitive resources. Furthermore, such an event might serve as a precursor to further malicious actions within an AWS account. It is crucial for analysts to conduct follow-up investigations by reviewing recent IAM activities related to user additions or group creations to ascertain the context surrounding the deletion. The rule aims to enhance security monitoring by providing alerts for possibly suspicious changes in AWS IAM configurations.
Categories
  • Cloud
  • AWS
  • Identity Management
Data Sources
  • Cloud Storage
ATT&CK Techniques
  • T1069.003
  • T1098
  • T1069
Created: 2024-11-14