Stop CloudTrail Trail
Platform: AWS
MITRE ATT&CK Tactics
- Defense Evasion
Description
Stop the recording of events from a CloudTrail trail simulating an attacker disrupting logging to evade detection.
Attacker Actions:
- Stop a CloudTrail trail.
- Resulting event name:
StopTrail
- Assigned IAM Permission:
cloudtrail:StopTrail
Workflow Inputs:
Specify which user this attack should run as.
Clean Up:
- Restarts the CloudTrail trail.
- Executed as the
DeRF Default User
Execution Instructions
- See User Guide for Execution Instructions via the Google Cloud Console
- Programmatically execute this workflow with the following cli command:
Detection Artifacts
Identify when a CloudTrail trail is disabled through the AWS event, DeleteTrail
.
Refer to Stratus Red Team documentation for additional detailed detection artifacts produced by this attack technique.