From 40ceeff8d9d953cdc41e9c924e0ec00a20609a47 Mon Sep 17 00:00:00 2001 From: patel-bhavin Date: Mon, 1 Aug 2022 15:05:19 -0700 Subject: [PATCH] uuid --- atomics/T1562.008/T1562.008.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/atomics/T1562.008/T1562.008.yaml b/atomics/T1562.008/T1562.008.yaml index 3bea298a..d2fa8e47 100644 --- a/atomics/T1562.008/T1562.008.yaml +++ b/atomics/T1562.008/T1562.008.yaml @@ -322,7 +322,7 @@ atomic_tests: name: sh elevation_required: false - name: AWS - CloudWatch Log Stream Deletes - auto_generated_guid: 89422c87-b57b-4a04-a8ca-802bb9d06121 + auto_generated_guid: 89422c87-b57b-4a04-a12a-802bb11d06121 description: | Creates a new cloudWatch log group in AWS, Upon successful creation it will Delete the group. Attackers can use this technique to evade defenses by deleting the log stream. Once it is deleted, the logs created by the attackers will not be logged. https://www.elastic.co/guide/en/security/current/aws-cloudwatch-log-group-deletion.html#aws-cloudwatch-log-group-deletion