SES Identity Has Been Deleted

Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities

Sigma rule (View on GitHub)

 1title: SES Identity Has Been Deleted
 2id: 20f754db-d025-4a8f-9d74-e0037e999a9a
 3status: test
 4description: Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
 5references:
 6    - https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
 7author: Janantha Marasinghe
 8date: 2022-12-13
 9modified: 2022-12-28
10tags:
11    - attack.defense-evasion
12    - attack.t1070
13logsource:
14    product: aws
15    service: cloudtrail
16detection:
17    selection:
18        eventSource: 'ses.amazonaws.com'
19        eventName: 'DeleteIdentity'
20    condition: selection
21falsepositives:
22    - Unknown
23level: medium

References

Related rules

to-top