Techniques
Sample rules
AWS Config Resource Deletion
- source: elastic
- technicques:
- T1562
Description
Identifies attempts to delete AWS Config resources. AWS Config provides continuous visibility into resource configuration changes and compliance posture across an account. Deleting Config components can significantly reduce security visibility and auditability. Adversaries may delete or disable Config resources to evade detection, hide prior activity, or weaken governance controls before or after other malicious actions.
Detection logic
event.dataset: aws.cloudtrail
and event.provider: config.amazonaws.com
and event.outcome: success
and event.action: (DeleteConfigRule or DeleteOrganizationConfigRule or DeleteConfigurationAggregator or
DeleteConfigurationRecorder or DeleteConformancePack or DeleteOrganizationConformancePack or
DeleteDeliveryChannel or DeleteRemediationConfiguration or DeleteRetentionConfiguration)
and not aws.cloudtrail.user_identity.invoked_by: (securityhub.amazonaws.com or fms.amazonaws.com or controltower.amazonaws.com or config-conforms.amazonaws.com)