heroui logo

AWS CloudTrail Important Change

Sigma Rules

View Source
Summary
This detection rule is designed to monitor activity in AWS CloudTrail, particularly for actions that may signify malicious intent or unauthorized alterations. It focuses on three key event types associated with managing CloudTrail: 'StopLogging', 'UpdateTrail', and 'DeleteTrail'. These events can indicate attempts to disable tracking, modifications that could obscure account activities, or outright deletion of trails, thereby impairing the ability to audit user actions in the AWS environment. The rule helps organizations maintain visibility into changes that could undermine security measures, aligning with best practices for auditing and monitoring in AWS. The implementation of this detection rule is critical, as it triggers alerts for any such modifications made to CloudTrail, allowing timely investigation and remediation of potential threats. CloudTrail acts as a crucial component in AWS security posture, and thus, protecting its configuration is essential for maintaining overall control over AWS accounts. The rule is currently in a testing phase.
Categories
  • Cloud
  • AWS
  • Infrastructure
Data Sources
  • Cloud Service
  • Logon Session
Created: 2020-01-21