Cloudtrail disable log file validation
An adversary may attempt to disable log file validation to enable them to tamper with the logs
|trailname||str||Name of the cloudtrail to be targeted||example-cloudtrail|
aws cloudtrail update-trail --name example-cloudtrail --no-enable-log-file-validation
When logs are ingested into ELK, the following Lucene query can be used to identify relevant events.
eventName:UpdateTrail AND eventSource:*.cloudtrail.amazonaws.com
--- title: Cloudtrail disable log file validation id: e0608025-7e8e-4b26-8ac8-e7711d3df52f status: experimental author: Nick Jones date: 2020-06-18 description: An adversary may attempt to disable log file validation to enable them to tamper with the logs logsource: service: cloudtrail detection: selection_source: - eventSource: "*.cloudtrail.amazonaws.com" events: - eventName: "UpdateTrail" condition: selection_source AND events level: low tags: - attack.t1089