SigmaHQ/rules/cloud/aws_cloudtrail_disable_logging.yml

27 lines
729 B
YAML
Raw Normal View History

2020-01-29 19:25:46 +00:00
title: AWS CloudTrail Important Change
id: 4db60cc0-36fb-42b7-9b58-a5b53019fb74
status: experimental
2020-09-14 04:03:04 +00:00
description: Detects disabling, deleting and updating of a Trail
author: vitaliy0x1
2020-01-29 19:25:46 +00:00
date: 2020/01/21
references:
2020-06-16 20:46:08 +00:00
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
logsource:
2020-06-16 20:46:08 +00:00
service: cloudtrail
detection:
2020-06-16 20:46:08 +00:00
selection_source:
- eventSource: cloudtrail.amazonaws.com
events:
- eventName:
- StopLogging
- UpdateTrail
- DeleteTrail
condition: selection_source AND events
falsepositives:
- Valid change in a Trail
2020-09-14 04:03:04 +00:00
level: medium
tags:
2020-07-18 01:41:10 +00:00
- attack.defense_evasion
2020-06-16 20:46:08 +00:00
- attack.t1562.001
- attack.t1089 # an old one