
Summary
This rule detects attempts to delete AWS Config Service resources, which could signify malicious actions aimed at obscuring visibility into an AWS account's security posture. The rule is designed to identify various AWS API calls related to the deletion of Config resources, including DeleteConfigRule, DeleteOrganizationConfigRule, and several others. Such deletions can hinder security monitoring and change tracking by removing vital configuration history, which attackers may exploit to cover their traces after unauthorized access. The detection uses CloudTrail logs over a specific timeframe and integrates with AWS for comprehensive monitoring of configuration-related actions. It's crucial during investigations to assess the legitimacy of the deletion based on user activity, resource criticality, and adherence to established change management policies.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Network Traffic
- Application Log
ATT&CK Techniques
- T1562
- T1562.001
Created: 2020-06-26