AWS Config Resource Deletion
Identifies attempts to delete AWS Config resources. AWS Config provides continuous visibility into resource configuration changes and compliance posture across an account. Deleting Config components can significantly reduce security visibility and auditability. Adversaries may delete or disable Config resources to evade detection, hide prior activity, or weaken governance controls before or after other malicious actions.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2020/06/26"
3integration = ["aws"]
4maturity = "production"
5updated_date = "2025/12/12"
6
7[rule]
8author = ["Elastic", "Austin Songer"]
9description = """
10Identifies attempts to delete AWS Config resources. AWS Config provides continuous visibility into resource
11configuration changes and compliance posture across an account. Deleting Config components can significantly reduce
12security visibility and auditability. Adversaries may delete or disable Config resources to evade detection, hide prior
13activity, or weaken governance controls before or after other malicious actions.
14"""
15false_positives = [
16 """
17 Deletion of AWS Config resources may occur during legitimate account restructuring, environment teardown, or changes
18 to compliance tooling. Centralized security teams or approved automation may also delete and recreate Config
19 components as part of controlled workflows. Confirm that the action aligns with approved change management and was
20 performed by an expected principal.
21 """,
22]
23from = "now-6m"
24index = ["filebeat-*", "logs-aws.cloudtrail-*"]
25language = "kuery"
26license = "Elastic License v2"
27name = "AWS Config Resource Deletion"
28note = """## Triage and analysis
29
30> **Disclaimer**:
31> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
32
33### Investigating AWS Config Resource Deletion
34
35AWS Config records configuration changes, relationships, and compliance status for AWS resources over time.
36Deleting Config components such as recorders, delivery channels, rules, or conformance packs disrupts
37security monitoring, compliance enforcement, and forensic visibility. This behavior is uncommon outside of
38planned infrastructure changes and should be treated as high-risk when unexpected. This rule detects successful deletion of AWS Config resources.
39
40### Possible investigation steps
41
42**Identify the actor**
43- Review `aws.cloudtrail.user_identity.arn` and `aws.cloudtrail.user_identity.access_key_id` to determine who initiated the deletion.
44- Confirm whether this principal typically manages AWS Config or centralized security tooling.
45- Check `user_agent.original` to determine whether the action was performed via console, CLI, SDK, or automation.
46
47**Determine what was deleted**
48- Inspect `event.action` and `aws.cloudtrail.request_parameters` to identify which Config component was removed
49 (e.g., configuration recorder, delivery channel, rule, aggregator, or conformance pack).
50- Assess whether the deleted resource was account-scoped or organization-wide. Used for compliance reporting, guardrails, or security monitoring.
51- Identify the affected regions and accounts using `cloud.region` and `cloud.account.id`.
52
53**Reconstruct timing and intent**
54- Use `@timestamp` to correlate the deletion with:
55 - IAM changes (role updates, policy modifications, STS activity).
56 - Other monitoring disruptions (CloudTrail, GuardDuty, Security Hub).
57 - Destructive or high-impact actions occurring shortly before or after.
58- Compare the timing against approved maintenance windows or infrastructure changes.
59
60**Correlate with broader activity**
61- Pivot in CloudTrail on the same principal or access key to identify:
62 - Additional attempts to disable logging or security controls.
63 - Resource deletions or configuration weakening across services.
64- Evaluate whether the deletion appears isolated or part of a broader evasion sequence.
65
66**Validate intent with stakeholders**
67- Confirm with security, cloud platform, or compliance teams whether the deletion was planned and approved.
68- Verify whether replacement Config resources were created shortly after, or whether monitoring remains disabled.
69
70### False positive analysis
71
72- **Planned environment changes**
73 - Non-production account teardown, environment consolidation, or compliance tool migrations may involve
74 deletion of Config resources.
75
76- **Authorized security automation**
77 - Approved automation or security tooling may delete and recreate Config components during setup or remediation.
78 - Tune exceptions carefully using specific principals or automation roles rather than broad exclusions.
79
80### Response and remediation
81
82- **Contain and restore visibility**
83 - If unauthorized, immediately re-enable AWS Config components, including recorders and delivery channels.
84 - Validate that historical configuration data and compliance reporting resume as expected.
85
86- **Investigate scope and impact**
87 - Determine how long Config visibility was impaired and what activity may have occurred during that window.
88 - Review other monitoring gaps (e.g., CloudTrail or GuardDuty changes) for coordinated evasion.
89
90- **Credential and access review**
91 - Rotate or disable credentials associated with the deleting principal if compromise is suspected.
92 - Review IAM permissions to ensure only a minimal, well-defined set of roles can manage AWS Config.
93
94- **Hardening and prevention**
95 - Use SCPs or IAM conditions to restrict deletion of Config resources in production and security accounts.
96 - Implement AWS Config rules or Security Hub controls to alert when Config is disabled or degraded.
97 - Document and formalize change procedures for governance tooling.
98
99### Additional information
100- **[AWS IR Playbooks](https://github.com/aws-samples/aws-incident-response-playbooks/blob/c151b0dc091755fffd4d662a8f29e2f6794da52c/playbooks/)**
101- **[AWS Customer Playbook Framework](https://github.com/aws-samples/aws-customer-playbook-framework/tree/a8c7b313636b406a375952ac00b2d68e89a991f2/docs)**
102- **[AWS Knowledge Center – Security Best Practices](https://aws.amazon.com/premiumsupport/knowledge-center/security-best-practices/)**
103"""
104references = [
105 "https://docs.aws.amazon.com/config/latest/developerguide/how-does-config-work.html",
106 "https://docs.aws.amazon.com/config/latest/APIReference/API_Operations.html",
107]
108risk_score = 47
109rule_id = "7024e2a0-315d-4334-bb1a-552d604f27bc"
110severity = "medium"
111tags = [
112 "Domain: Cloud",
113 "Data Source: AWS",
114 "Data Source: Amazon Web Services",
115 "Data Source: AWS Config",
116 "Resources: Investigation Guide",
117 "Tactic: Defense Evasion",
118]
119timestamp_override = "event.ingested"
120type = "query"
121
122query = '''
123event.dataset: aws.cloudtrail
124 and event.provider: config.amazonaws.com
125 and event.outcome: success
126 and event.action: (DeleteConfigRule or DeleteOrganizationConfigRule or DeleteConfigurationAggregator or
127 DeleteConfigurationRecorder or DeleteConformancePack or DeleteOrganizationConformancePack or
128 DeleteDeliveryChannel or DeleteRemediationConfiguration or DeleteRetentionConfiguration)
129 and not aws.cloudtrail.user_identity.invoked_by: (securityhub.amazonaws.com or fms.amazonaws.com or controltower.amazonaws.com or config-conforms.amazonaws.com)
130'''
131
132
133[[rule.threat]]
134framework = "MITRE ATT&CK"
135[[rule.threat.technique]]
136id = "T1562"
137name = "Impair Defenses"
138reference = "https://attack.mitre.org/techniques/T1562/"
139[[rule.threat.technique.subtechnique]]
140id = "T1562.001"
141name = "Disable or Modify Tools"
142reference = "https://attack.mitre.org/techniques/T1562/001/"
143
144[[rule.threat.technique.subtechnique]]
145id = "T1562.008"
146name = "Disable or Modify Cloud Logs"
147reference = "https://attack.mitre.org/techniques/T1562/008/"
148
149
150
151[rule.threat.tactic]
152id = "TA0005"
153name = "Defense Evasion"
154reference = "https://attack.mitre.org/tactics/TA0005/"
155
156[rule.investigation_fields]
157field_names = [
158 "@timestamp",
159 "user.name",
160 "user_agent.original",
161 "source.ip",
162 "aws.cloudtrail.user_identity.arn",
163 "aws.cloudtrail.user_identity.type",
164 "aws.cloudtrail.user_identity.access_key_id",
165 "event.action",
166 "event.outcome",
167 "cloud.account.id",
168 "cloud.region",
169 "aws.cloudtrail.request_parameters"
170]
Triage and analysis
Disclaimer: This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
Investigating AWS Config Resource Deletion
AWS Config records configuration changes, relationships, and compliance status for AWS resources over time. Deleting Config components such as recorders, delivery channels, rules, or conformance packs disrupts security monitoring, compliance enforcement, and forensic visibility. This behavior is uncommon outside of planned infrastructure changes and should be treated as high-risk when unexpected. This rule detects successful deletion of AWS Config resources.
Possible investigation steps
Identify the actor
- Review
aws.cloudtrail.user_identity.arnandaws.cloudtrail.user_identity.access_key_idto determine who initiated the deletion. - Confirm whether this principal typically manages AWS Config or centralized security tooling.
- Check
user_agent.originalto determine whether the action was performed via console, CLI, SDK, or automation.
Determine what was deleted
- Inspect
event.actionandaws.cloudtrail.request_parametersto identify which Config component was removed (e.g., configuration recorder, delivery channel, rule, aggregator, or conformance pack). - Assess whether the deleted resource was account-scoped or organization-wide. Used for compliance reporting, guardrails, or security monitoring.
- Identify the affected regions and accounts using
cloud.regionandcloud.account.id.
Reconstruct timing and intent
- Use
@timestampto correlate the deletion with:- IAM changes (role updates, policy modifications, STS activity).
- Other monitoring disruptions (CloudTrail, GuardDuty, Security Hub).
- Destructive or high-impact actions occurring shortly before or after.
- Compare the timing against approved maintenance windows or infrastructure changes.
Correlate with broader activity
- Pivot in CloudTrail on the same principal or access key to identify:
- Additional attempts to disable logging or security controls.
- Resource deletions or configuration weakening across services.
- Evaluate whether the deletion appears isolated or part of a broader evasion sequence.
Validate intent with stakeholders
- Confirm with security, cloud platform, or compliance teams whether the deletion was planned and approved.
- Verify whether replacement Config resources were created shortly after, or whether monitoring remains disabled.
False positive analysis
-
Planned environment changes
- Non-production account teardown, environment consolidation, or compliance tool migrations may involve deletion of Config resources.
-
Authorized security automation
- Approved automation or security tooling may delete and recreate Config components during setup or remediation.
- Tune exceptions carefully using specific principals or automation roles rather than broad exclusions.
Response and remediation
-
Contain and restore visibility
- If unauthorized, immediately re-enable AWS Config components, including recorders and delivery channels.
- Validate that historical configuration data and compliance reporting resume as expected.
-
Investigate scope and impact
- Determine how long Config visibility was impaired and what activity may have occurred during that window.
- Review other monitoring gaps (e.g., CloudTrail or GuardDuty changes) for coordinated evasion.
-
Credential and access review
- Rotate or disable credentials associated with the deleting principal if compromise is suspected.
- Review IAM permissions to ensure only a minimal, well-defined set of roles can manage AWS Config.
-
Hardening and prevention
- Use SCPs or IAM conditions to restrict deletion of Config resources in production and security accounts.
- Implement AWS Config rules or Security Hub controls to alert when Config is disabled or degraded.
- Document and formalize change procedures for governance tooling.
Additional information
References
Related rules
- AWS Configuration Recorder Stopped
- AWS Route 53 Resolver Query Log Configuration Deleted
- AWS WAF Access Control List Deletion
- AWS WAF Rule or Rule Group Deletion
- AWS RDS DB Instance Made Public