
Summary
This detection rule focuses on monitoring the AWS CloudTrail logs to identify actions that disable AWS Config service components, specifically the deletion of delivery channels and stopping the configuration recorder. The rule triggers alerts when there are events logged in CloudTrail that originate from the AWS Config service, particularly when actions such as `DeleteDeliveryChannel` or `StopConfigurationRecorder` are executed. These actions could signify potential evasion tactics used by malicious actors to hide changes or activities associated with an AWS environment, thus presenting a serious threat to the integrity of the configuration management and compliance measures in place. The rule caters to incidents relating to defense evasion tactics denoted by the MITRE ATT&CK framework as T1562.001, indicating its relevance for monitoring AWS environments for unauthorized changes or potentially harmful activity.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
Created: 2020-01-21