AWS GuardDuty Detector Deleted Or Updated
Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities. Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost. Verify with the user identity that this activity is legitimate.
Sigma rule (View on GitHub)
1title: AWS GuardDuty Detector Deleted Or Updated
2id: d2656e78-c069-4571-8220-9e0ab5913f19
3status: experimental
4description: |
5 Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities.
6 Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost.
7 Verify with the user identity that this activity is legitimate.
8references:
9 - https://docs.aws.amazon.com/guardduty/latest/APIReference/API_DeleteDetector.html
10 - https://docs.aws.amazon.com/guardduty/latest/APIReference/API_UpdateDetector.html
11 - https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_suspend-disable.html
12 - https://docs.datadoghq.com/security/default_rules/719-39f-9cd/
13 - https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-aws-guardduty-detector-is-enabled
14 - https://docs.stellarcyber.ai/5.2.x/Using/ML/Alert-Rule-Based-Potentially_Malicious_AWS_Activity.html
15 - https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Amazon%20Web%20Services/Analytic%20Rules/AWS_GuardDutyDisabled.yaml
16 - https://github.com/elastic/detection-rules/blob/main/rules/integrations/aws/defense_evasion_guardduty_detector_deletion.toml
17 - https://help.fortinet.com/fsiem/Public_Resource_Access/7_4_0/rules/PH_RULE_AWS_GuardDuty_Detector_Deletion.htm
18 - https://research.splunk.com/sources/5d8bd475-c8bc-4447-b27f-efa508728b90/
19 - https://suktech24.com/2025/07/17/aws-threat-detection-rule-guardduty-detector-disabled-or-suspended/
20 - https://www.atomicredteam.io/atomic-red-team/atomics/T156001#atomic-test-46---aws---guardduty-suspension-or-deletion
21author: suktech24
22date: 2025-11-27
23tags:
24 - attack.defense-impairment
25 - attack.t1685
26 - attack.t1685.002
27logsource:
28 product: aws
29 service: cloudtrail
30detection:
31 selection_event_source:
32 eventSource: 'guardduty.amazonaws.com'
33 selection_action_delete:
34 eventName: 'DeleteDetector'
35 selection_action_update:
36 eventName: 'UpdateDetector'
37 requestParameters.enable: 'false'
38 selection_status_success:
39 errorCode: 'Success'
40 selection_status_null:
41 errorCode: null
42 condition: selection_event_source and 1 of selection_action_* and 1 of selection_status_*
43falsepositives:
44 - Legitimate detector deletion by an admin (e.g., during account decommissioning).
45 - Temporary disablement for troubleshooting (verify via change management tickets).
46 - Automated deployment tools (e.g. Terraform) managing GuardDuty state.
47level: high
References
Related rules
- AMSI Bypass Pattern Assembly GetType
- AMSI Disabled via Registry Modification
- ASLR Disabled Via Sysctl or Direct Syscall - Linux
- AWS CloudTrail Important Change
- AWS Config Disabling Channel/Recorder