---
title: AWS GuardDuty detector deleted
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: Docs > Datadog Security > OOTB Rules > AWS GuardDuty detector deleted
---

# AWS GuardDuty detector deleted
Classification:attackTactic:[TA0005-defense-evasion](https://attack.mitre.org/tactics/TA0005)Technique:[T1562-impair-defenses](https://attack.mitre.org/techniques/T1562) 
## Goal{% #goal %}

Detect when an attacker is trying to evade defenses by deleting a GuardDuty detector.

## Strategy{% #strategy %}

This rule lets you monitor this CloudTrail API call to detect if an attacker is deleting a GuardDuty Detector:

- [DeleteDetector](https://docs.aws.amazon.com/guardduty/latest/ug/delete-detector.html)

## Triage and response{% #triage-and-response %}

1. Determine which user in your organization owns the API key that made this API call.
1. Contact the user to see if they intended to make this API call.
1. If the user did not make the API call:
   - Rotate the credentials.
   - Investigate if the same credentials made other unauthorized API calls.
