Skip to content

Commit a8d8dcf

Browse files
saakovvIvan.Saakovnasbench
authored
Merge PR #5015 from @saakovv - Add AWS SAML Provider Deletion Activity
new: AWS SAML Provider Deletion Activity --------- Co-authored-by: Ivan.Saakov <[email protected]> Co-authored-by: Nasreddine Bencherchali <[email protected]>
1 parent 3449958 commit a8d8dcf

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
title: AWS SAML Provider Deletion Activity
2+
id: ccd6a6c8-bb4e-4a91-9d2a-07e632819374
3+
status: experimental
4+
description: |
5+
Detects the deletion of an AWS SAML provider, potentially indicating malicious intent to disrupt administrative or security team access.
6+
An attacker can remove the SAML provider for the information security team or a team of system administrators, to make it difficult for them to work and investigate at the time of the attack and after it.
7+
references:
8+
- https://docs.aws.amazon.com/IAM/latest/APIReference/API_DeleteSAMLProvider.html
9+
author: Ivan Saakov
10+
date: 2024-12-19
11+
tags:
12+
- attack.t1078.004
13+
- attack.privilege-escalation
14+
- attack.t1531
15+
logsource:
16+
product: aws
17+
service: cloudtrail
18+
detection:
19+
selection:
20+
eventSource: 'iam.amazonaws.com'
21+
eventName: 'DeleteSAMLProvider'
22+
status: 'success'
23+
condition: selection
24+
falsepositives:
25+
- Automated processes using tools like Terraform may trigger this alert.
26+
- Legitimate administrative actions by authorized system administrators could cause this alert. Verify the user identity, user agent, and hostname to ensure they are expected.
27+
- Deletions by unfamiliar users should be investigated. If the behavior is known and expected, it can be exempted from the rule.
28+
level: medium

0 commit comments

Comments
 (0)