AWS CreateFilter
Creates a GuardDuty finding filter that automatically suppresses or highlights findings matching specified criteria.
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify...
View on MITRE ATT&CK →Creates a GuardDuty finding filter that automatically suppresses or highlights findings matching specified criteria.
Permanently deletes an IAM user's access key, revoking the associated programmatic access credentials.
Deletes one or more CloudWatch alarms, removing their monitoring configurations and associated notifications.
Permanently deletes an S3 bucket; the bucket must be empty before deletion can succeed.
Removes the resource-based policy from an S3 bucket, reverting to default access controls.
Deletes an AWS Config rule that was evaluating the compliance of AWS resource configurations.
Deletes the AWS Config configuration recorder, stopping resource configuration recording in the region.
Deletes the AWS Config delivery channel, stopping delivery of configuration snapshots and change notifications to S3 or SNS.
Disables and permanently deletes a GuardDuty detector in the region, stopping all threat detection.
Deletes VPC Flow Log configurations, stopping the capture of network traffic metadata for the specified resources.
Removes an IAM user's console password, preventing them from signing in to the AWS Management Console.
Removes the permissions boundary from an IAM role, potentially expanding the role's maximum effective permissions.
Deletes an inline policy embedded directly in an IAM role.
Permanently deletes a WAF rule group containing a set of web traffic filtering rules.
Permanently deletes an IAM user; all attached policies, group memberships, and keys must be removed first.
Removes the permissions boundary from an IAM user, potentially expanding their maximum effective permissions.
Deletes an inline policy embedded directly in an IAM user.
Permanently deletes a WAF Web ACL used to protect web applications from common web threats.
Detaches a managed IAM policy from a role, removing those permissions from the role's effective policy.
Detaches a managed IAM policy from an IAM user, removing those permissions from the user.
Removes the current member account from its AWS Organization; the management account cannot leave.
Creates a log exclusion rule in Cloud Logging that prevents matching log entries from being ingested.
Deletes a resource lock, removing protection against deletion or modification of critical resources.
Permanently deletes an Azure virtual machine.
Permanently deletes an Azure Event Hub entity within a namespace.
Deletes an Azure Monitor diagnostic setting, stopping the forwarding of logs and metrics to a configured destination.
Deletes an Azure Monitor metric alert rule.
Permanently deletes an Azure Key Vault; without soft-delete, all secrets, keys, and certificates are unrecoverable.
Deletes a secret from an Azure Key Vault.
Deletes a network security group, removing network access controls from associated resources.
Deletes an NSG flow log configuration, stopping the capture of network traffic metadata for a network security group.
Removes a protected item from Azure Backup, stopping protection and deleting associated backup data.
Creates or updates a suppression rule in Microsoft Defender for Cloud, hiding matching security alerts.
Changes the pricing tier (plan) for Microsoft Defender for Cloud on a subscription or specific resource type.
Removes a security solution integrated with Microsoft Defender for Cloud.
Permanently deletes an Azure Storage account and all of its data.
Modifies attributes of an AMI, such as making it public or sharing it with specific AWS accounts.
Modifies a specific attribute of an EC2 instance, such as its instance type, user data, or security groups.
Sets the Access Control List (ACL) for an S3 bucket, controlling access for specific AWS accounts or predefined groups.
Sets lifecycle configuration on an S3 bucket to automate object transitions or expiration over time.
Sets lifecycle rules on an S3 bucket to automatically transition objects to cheaper storage tiers or expire them.
Applies or replaces the resource-based policy on an S3 bucket, defining who can access it and how.
Modifies S3 bucket public access block settings, potentially disabling protections to allow public data exposure.
Sets a permissions boundary on an IAM role, capping the maximum permissions the role can be granted.
Sets a permissions boundary on an IAM user, limiting the maximum permissions they can ever be granted.
Removes an AWS account from the organization, stripping it of SCP protections and centralized security controls.
Schedules a KMS customer managed key for deletion after a waiting period (7-30 days), after which encrypted data is unrecoverable.
Permanently deletes a secret and all of its versions from GCP Secret Manager.
Permanently destroys a specific version of a secret in GCP Secret Manager, making its data irrecoverable.
Updates the settings or configuration of Google Security Command Center for the organization or project.
Deletes a finding source from Google Security Command Center.
Stops AWS Config from recording resource configuration changes in the region.
Stops GuardDuty from monitoring specified member accounts under an administrator account.
Permanently deletes a GCP Cloud Storage bucket; the bucket must be empty before deletion.
Sets the IAM policy on a Cloud Storage bucket or object, controlling which principals can access it.
Permanently terminates one or more EC2 instances, releasing instance store data and associated resources.
Modifies an existing Conditional Access policy, changing the conditions or controls that govern how users authenticate.
Updates a named location definition (IP ranges or countries) used in Entra ID Conditional Access policy conditions.
Updates the configuration of a GuardDuty detector, such as enabling or disabling specific threat detection data sources.
Updates the properties of an Azure Key Vault, such as its access policies, network rules, or soft-delete configuration.