
Summary
This rule is designed to detect suspicious activities related to the deletion or disabling of AWS GuardDuty detectors, which can indicate potential malicious intent by an attacker attempting to bypass detection mechanisms. Specifically, the rule monitors events from AWS CloudTrail that relate to the `DeleteDetector` and disabling the detection capabilities via the `UpdateDetector` API actions. When successfully executed, either action will terminate monitoring in the environment and erase all corresponding findings. The detection logic ensures that at least one of the specified actions (delete or update) has been initiated while confirming that the event source is GuardDuty and that the operation was marked as successful or null (indicating the action was valid). It is essential to verify the legitimacy of such event sources by checking the identity of the user who performed the action and any associated change management processes. False positives may arise in scenarios such as legitimate administrative actions, temporary deactivations for troubleshooting, or automated tools managing the GuardDuty state. Therefore, closely monitoring and verifying the context of any detection is crucial for accurate incident response.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
- Network Traffic
ATT&CK Techniques
- T1560
Created: 2025-11-27