
Summary
The detection rule identifies the deletion of AWS CloudWatch log streams, a critical action that eliminates archived log events associated with those streams. This rule leverages the `DeleteLogStream` API action, positing that malicious entities might execute this action to obscure their activities and hinder security monitoring efforts. The rule targets logs generated by AWS CloudTrail, monitoring for successful deletions performed within a specified timeframe of the last 60 minutes. It is particularly important due to the potential misuse of log deletion by attackers seeking to erase traces of their actions, thus affecting the integrity of monitoring systems. The rule facilitates investigations by advising analysts to verify the legitimacy of deletion activities, especially when they originate from unknown users or hosts, and provides steps to assess the context of the incident.
Categories
- Cloud
- On-Premise
- Infrastructure
Data Sources
- Cloud Service
- Network Traffic
- Logon Session
- Application Log
ATT&CK Techniques
- T1485
- T1562
- T1562.001
Created: 2020-05-20