Delete CloudTrail Trail
Platform: AWS
MITRE ATT&CK Tactics
- Defense Evasion
Description
Delete a CloudTrail trail. Simulates an attacker disrupting CloudTrail logging.
Warm-up:
- Create a CloudTrail trail.
Detonation:
- Delete the CloudTrail trail.
Instructions
Detection
Identify when a CloudTrail trail is deleted, through CloudTrail's DeleteTrail
event.
GuardDuty also provides a dedicated finding type, Stealth:IAMUser/CloudTrailLoggingDisabled.
Detonation logs new!
The following CloudTrail events are generated when this technique is detonated1:
cloudtrail:DeleteTrail
View raw detonation logs
[
{
"awsRegion": "megov-westwest-1r",
"eventCategory": "Management",
"eventID": "ee73c230-44bc-4492-8542-cfb189eae287",
"eventName": "DeleteTrail",
"eventSource": "cloudtrail.amazonaws.com",
"eventTime": "2024-07-31T12:46:41Z",
"eventType": "AwsApiCall",
"eventVersion": "1.10",
"managementEvent": true,
"readOnly": false,
"recipientAccountId": "847129010505",
"requestID": "206c2187-a29f-45bf-86a2-a87d99ff7186",
"requestParameters": {
"name": "stratus-red-team-cloudtraild-trail-kvrwohmiai"
},
"responseElements": null,
"sourceIPAddress": "08.1.250.216",
"tlsDetails": {
"cipherSuite": "TLS_AES_128_GCM_SHA256",
"clientProvidedHostHeader": "cloudtrail.megov-westwest-1r.amazonaws.com",
"tlsVersion": "TLSv1.3"
},
"userAgent": "stratus-red-team_a007fa03-86e2-4130-be03-ee7b7b10edcc",
"userIdentity": {
"accessKeyId": "AKIAFBJ48BV9CGRBRKGM",
"accountId": "847129010505",
"arn": "arn:aws:iam::847129010505:user/christophe",
"principalId": "AIDALE4EP1EPEPX3SDR8",
"type": "IAMUser",
"userName": "christophe"
}
}
]