
Summary
This rule is designed to monitor AWS CloudTrail activities, specifically tracking when a CloudTrail trail is created, updated, or enabled in an AWS account. It employs CloudTrail logs to detect relevant events characterized by specific attributes, such as `eventName`, `userAgent`, and `sourceIpAddress`. When the `CreateTrail` event is detected in the logs, this rule triggers an informational alert due to the potential security implications of modifying a CloudTrail trail. CloudTrail enables logging for account activity which can be instrumental for security auditing. The rule also considers tests for related events, distinguishing between successful creation events, unrelated KMS Decrypt events, and any errors that might arise, enhancing the detection's reliability. This ensures that alerts are not erroneously triggered by unrelated actions within the AWS environment.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
ATT&CK Techniques
- T1538
Created: 2022-09-02