heroui logo

AWS Defense Evasion Delete Cloudtrail

Splunk Security Content

View Source
Summary
The 'AWS Defense Evasion Delete Cloudtrail' detection rule focuses on identifying the deletion of AWS CloudTrail logs through the monitoring of `DeleteTrail` events in CloudTrail logs. This analytic specifically captures events that indicate successful deletions of CloudTrail trails, while filtering out actions initiated from the AWS Management Console to narrow down potentially malicious activities. The significance of this detection lies in the fact that attackers may attempt to delete these logs as a means to erase traces of their activities, thereby evading detection and maintaining unauthorized access within the AWS environment. If an instance of this behavior is confirmed as malicious, it raises alarms about the security posture of the affected AWS account. To implement this detection, users must have the Splunk AWS Add-on installed and ensure that CloudTrail logging is enabled in their AWS environment.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Cloud Service
ATT&CK Techniques
  • T1562
  • T1562.008
Created: 2024-11-14