AWS Bucket Deleted

Detects the deletion of S3 buckets in AWS CloudTrail logs. Monitoring the deletion of S3 buckets is critical for security and data integrity, as it may indicate potential data loss or unauthorized access attempts.

Sigma rule (View on GitHub)

 1title: AWS Bucket Deleted
 2id: 39c9f26d-6e3b-4dbb-9c7a-4154b0281112
 3status: experimental
 4description: |
 5    Detects the deletion of S3 buckets in AWS CloudTrail logs.
 6    Monitoring the deletion of S3 buckets is critical for security and data integrity, as it may indicate potential data loss or unauthorized access attempts.    
 7references:
 8    - https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucket.html
 9    - https://awscli.amazonaws.com/v2/documentation/api/latest/reference/s3api/delete-bucket.html
10author: Ivan Saakov, Nasreddine Bencherchali
11date: 2025-10-19
12tags:
13    - attack.defense-evasion
14logsource:
15    product: aws
16    service: cloudtrail
17detection:
18    selection_event_name:
19        eventName: 'DeleteBucket'
20    selection_status_success:
21        errorCode: 'Success'
22    selection_status_null:
23        errorCode: null
24    condition: selection_event_name and 1 of selection_status_*
25falsepositives:
26    - During maintenance operations or testing, authorized administrators may delete S3 buckets as part of routine data management or cleanup activities.
27level: medium

References

Related rules

to-top