a6e7cce606
chore: promote older rules status from `experimental` to `test` --------- Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
24 lines
740 B
YAML
24 lines
740 B
YAML
title: SES Identity Has Been Deleted
|
|
id: 20f754db-d025-4a8f-9d74-e0037e999a9a
|
|
status: test
|
|
description: Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
|
|
references:
|
|
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
|
|
author: Janantha Marasinghe
|
|
date: 2022/12/13
|
|
modified: 2022/12/28
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.t1070
|
|
logsource:
|
|
product: aws
|
|
service: cloudtrail
|
|
detection:
|
|
selection:
|
|
eventSource: 'ses.amazonaws.com'
|
|
eventName: 'DeleteIdentity'
|
|
condition: selection
|
|
falsepositives:
|
|
- Unknown
|
|
level: medium
|