
Summary
This analytic rule is designed to detect attempts to impair AWS security services by deleting critical configurations using CloudTrail logs. It specifically monitors for key events such as 'DeleteLogStream', 'DeleteDetector', and other deletion actions that typically indicate an effort to disrupt security monitoring. Because such actions can significantly compromise the security posture of an AWS environment by potentially allowing attackers to operate undetected, the rule is crucial for maintaining operational security. By identifying these deletion activities, security teams can respond swiftly to mitigate risks associated with impaired security functionalities. The detection mechanism leverages AWS CloudTrail, records important API calls, and aggregates the data for analysis, ensuring prompt incident response actions. This rule also considers potential false positives, stressing that legitimate administrative activities might trigger alerts, thus requiring careful investigation.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Cloud Service
- Logon Session
ATT&CK Techniques
- T1562.008
- T1562
Created: 2024-11-14