7364ce00b1
fix: Azure Active Directory Hybrid Health AD FS New Server - Update Logsource to align with the rest of the azure rules fix: Azure Active Directory Hybrid Health AD FS Service Delete - Update Logsource to align with the rest of the azure rules fix: Number Of Resource Creation Or Deployment Activities - Update Logsource to align with the rest of the azure rules fix: Granting Of Permissions To An Account - Update Logsource to align with the rest of the azure rules fix: Rare Subscription-level Operations In Azure - Update Logsource to align with the rest of the azure rules fix: Google Workspace Application Removed - Update logsource product field to `gcp` fix: Google Workspace Granted Domain API Access - Update logsource product field to `gcp` fix: Google Workspace MFA Disabled - Update logsource product field to `gcp` fix: Google Workspace Role Modified or Deleted - Update logsource product field to `gcp` fix: Google Workspace Role Privilege Deleted - Update logsource product field to `gcp` fix: Google Workspace User Granted Admin Privileges - Update logsource product field to `gcp`
27 lines
699 B
YAML
27 lines
699 B
YAML
title: AWS CloudTrail Important Change
|
|
id: 4db60cc0-36fb-42b7-9b58-a5b53019fb74
|
|
status: test
|
|
description: Detects disabling, deleting and updating of a Trail
|
|
references:
|
|
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
|
|
author: vitaliy0x1
|
|
date: 2020/01/21
|
|
modified: 2022/10/09
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.t1562.001
|
|
logsource:
|
|
product: aws
|
|
service: cloudtrail
|
|
detection:
|
|
selection_source:
|
|
eventSource: cloudtrail.amazonaws.com
|
|
eventName:
|
|
- StopLogging
|
|
- UpdateTrail
|
|
- DeleteTrail
|
|
condition: selection_source
|
|
falsepositives:
|
|
- Valid change in a Trail
|
|
level: medium
|