Deletion of multiple cloud resources

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-06-04
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

30 Minutes

Deduplication Period

5 Days

Required Data

  • Requires one of the following data sources:
    • AWS Audit Log
      OR
    • Azure Audit Log
      OR
    • Gcp Audit Log

Detection Modules

Cloud

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An identity deleted multiple cloud resources.

Attacker's Goals

Leverage access to the cloud to delete resources and cause damage to an organization's infrastructure.

Investigative actions

  • Confirm the legitimacy of the suspected identity and what cloud resources have been deleted by the identity.
  • Look for any unusual activity associated with the suspected identity and determine whether they are compromised.

Variations

Deletion of multiple cloud resources

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

An identity deleted multiple cloud resources.
This large volume of deleted cloud resources had not been seen across all projects for the last 30 days.

Attacker's Goals

Leverage access to the cloud to delete resources and cause damage to an organization's infrastructure.

Investigative actions

  • Confirm the legitimacy of the suspected identity and what cloud resources have been deleted by the identity.
  • Look for any unusual activity associated with the suspected identity and determine whether they are compromised.


Deletion of multiple cloud resources

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An identity deleted multiple cloud resources.
This large volume of deleted cloud resources had not been seen in this project for the last 30 days.

Attacker's Goals

Leverage access to the cloud to delete resources and cause damage to an organization's infrastructure.

Investigative actions

  • Confirm the legitimacy of the suspected identity and what cloud resources have been deleted by the identity.
  • Look for any unusual activity associated with the suspected identity and determine whether they are compromised.