
Summary
The AWS CloudTrail Log Updated detection rule is designed to identify unauthorized updates to AWS CloudTrail settings, specifically focusing on modifications made via the API `UpdateTrail`. CloudTrail is crucial for monitoring AWS account activity, as it provides a log of user actions across the AWS infrastructure. Attackers may attempt to modify CloudTrail settings to obscure their activities and evade detection. This rule triggers when an update action is logged successfully, signaling potential security risks that merit investigation. The detection logic uses the KQL query to filter logs from relevant data sources, including filebeat and AWS CloudTrail logs, to capture any unauthorized or suspicious trail updates. Additionally, the rule outlines investigation steps, triage guidelines, and response measures for ensuring proper incident handling and mitigation.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- Application Log
- Network Traffic
ATT&CK Techniques
- T1565
- T1565.001
- T1530
Created: 2020-06-10