SES Identity Has Been Deleted
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects an instance of an SES identity being deleted via the DeleteIdentity event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_AWS_SES_IDENTITY_DELETED" select Action1.CALLER,Action1.HOSTNAME,Action1.IPADDRESS,Action1.LOG_EVENT_NAME,Action1.SOURCE,Action1.SOURCE_REGION,Action1.REQUESTPARAMETERS
Detection
Execution Mode
realtime
Log Sources
AWS
Author
Janantha Marasinghe


