
Summary
This analytic rule detects events in AWS CloudTrail where logging is stopped, specifically through `StopLogging` actions. These events are significant as they indicate possible defense evasion by adversaries, allowing them to conduct operations without traces left in logging systems. The detection logic filters out actions executed via the console, focusing only on successful API calls that halt logging. If an attacker successfully stops logging, it can impede incident response and forensic investigations, potentially facilitating unauthorized access or data exfiltration. The rule uses event data from CloudTrail to pinpoint and report such activities, helping maintain a secure AWS environment by alerting security teams to potential threats.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
ATT&CK Techniques
- T1562
- T1562.008
Created: 2024-11-14