heroui logo

AWS Defense Evasion Update Cloudtrail

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect malicious attempts to modify AWS CloudTrail settings, specifically through the `UpdateTrail` events logged in AWS CloudTrail. The CloudTrail service logs API calls and service events, which are crucial for auditing purposes. By monitoring these logs, this rule aims to identify changes where the `UpdateTrail` API is invoked by any user agent other than the AWS Management Console, indicating a potentially unauthorized action. A successful `UpdateTrail` event can modify or disable logging features, presenting significant risks as attackers may exploit this to obscure their activities. The rule aggregates data from CloudTrail, summarizing the occurrences of such events along with relevant metadata such as the user and AWS account ID involved in the change. If detected, an investigation into the intent behind the modification is warranted to ensure the security of the AWS environment.
Categories
  • Cloud
Data Sources
  • Cloud Storage
ATT&CK Techniques
  • T1562
  • T1562.008
Created: 2024-11-14