
Summary
This rule detects unauthorized `UpdateTrail` events in AWS CloudTrail logs, which may indicate malicious attempts to evade detection by modifying logging configurations. By performing such updates, attackers could potentially limit logging to a single region, compromising the visibility of their activities across multiple AWS regions. This behavior is critical for Security Operations Centers (SOCs) to monitor, as it may reflect an adversary's strategy to remain undetected within a compromised AWS infrastructure. The significant impact of this tactic includes hindering incident response and forensic efforts due to decreased visibility of potentially harmful actions.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Application Log
ATT&CK Techniques
- T1562
- T1562.008
Created: 2024-11-14