
Summary
This rule identifies attempts to stop logging in AWS CloudTrail by detecting `StopLogging` API events. This action can be indicative of malicious activity, as it allows attackers to evade detection by halting the logs that track their actions within an AWS environment. By monitoring for specific entries within CloudTrail logs—particularly those that signify the cessation of logging—this analytic assists Security Operations Centers (SOC) in identifying and responding to potential threats that undermine logging integrity. The importance of this detection lies in its ability to flag significant evasion tactics, which can impair incident response and forensic investigations by keeping attackers hidden from scrutiny.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- Logon Session
ATT&CK Techniques
- T1562
- T1562.008
Created: 2024-11-14