Detection Strategy for Modify Cloud Compute Infrastructure: Delete Cloud Instance

ID: DET0084
Domains: Enterprise
Analytics: AN0234
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN0234

Defenders can detect suspicious cloud instance deletions by correlating events across authentication, instance lifecycle, and account activity. From a defender’s perspective, behaviors of interest include instances deleted shortly after creation, deletions initiated by new or rarely used accounts, deletions following snapshot creation, and deletions originating from anomalous geolocations or access keys. These may indicate adversarial attempts to destroy forensic evidence or evade detection.

Log Sources
Data Component Name Channel
Instance Stop (DC0089) AWS:CloudTrail TerminateInstances
Instance Metadata (DC0086) AWS:CloudTrail DescribeInstances
Instance Deletion (DC0081) azure:activity MICROSOFT.COMPUTE/VIRTUALMACHINES/DELETE
Mutable Elements
Field Description
UserContext Identity of the user/service account performing deletions; tuned to exclude automation or known administrative workflows.
TimeWindow Threshold for detecting rapid instance lifecycle events (e.g., creation and deletion within minutes).
GeoLocation Region or source IP where the delete request originated; can be tuned to align with enterprise cloud geography.
RateThreshold Number of deletions per user/account in a defined window; tuned for organizations with high elasticity.