
Summary
This detection rule identifies when Virtual Private Cloud (VPC) flow logs on AWS are deleted, which could indicate an attempt to impair defenses or hide malicious activities. The rule specifically looks for events corresponding to the deletion of flow logs, leveraging AWS CloudTrail logs which track all management events. It triggers when a 'DeleteFlowLogs' event is logged, allowing security teams to investigate whether the log removal correlates with a legitimate operation such as VPC deletion or if it constitutes a security threat. The corresponding remediation steps involve confirming any VPC deletion events to ascertain the legitimacy of log deletions and implement appropriate follow-up actions if no such deletion is apparent.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Application Log
ATT&CK Techniques
- T1562.008
Created: 2024-12-06