heroui logo

SES Identity Has Been Deleted

Sigma Rules

View Source
Summary
The detection rule titled 'SES Identity Has Been Deleted' is designed to monitor for the deletion of Amazon Simple Email Service (SES) identities via the 'DeleteIdentity' event. This event may signify malicious activity, particularly if it occurs in conjunction with suspicious behavior originating from that identity. Adversaries could use identity deletion as a means to cover their tracks after conducting harmful activities, making this rule critical for identifying potential compromises within AWS environments. The rule uses AWS CloudTrail logs to track the event source, ensuring sensitive actions related to SES identities are reviewed and flagged for further investigation. Analysts should pay particular attention to instances where identities tied to anomalous actions are removed, as this could represent an attempt to evade detection by eliminating traces of suspicious account activity. Any findings must be contextualized within the wider operational environment to accurately assess legitimacy and risk.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
Created: 2022-12-13