
Summary
This rule is designed to identify when an AWS log trail is deleted, which could indicate malicious activity aimed at evading security measures. The deletion of AWS CloudTrail logs is particularly concerning because it can prevent organizations from auditing their AWS infrastructure effectively, thereby allowing attackers to hide their tracks. The rule captures the relevant action using the 'DeleteTrail' API and triggers alerts when such actions occur within the last hour, specifically looking for successful deletions in AWS environments. It requires monitoring AWS CloudTrail logs and employs KQL (Kibana Query Language) for querying the event dataset. An investigation would typically involve verifying the legitimacy of the user account responsible for the deletion, analyzing past alerts related to that account, and cross-referencing IP addresses associated with the deletion to identify any anomalies or unauthorized access. The rule provides guidance for triage and response, emphasizing the critical steps needed to investigate and remediate any potential incidents.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1562
- T1562.001
Created: 2020-05-26