AWS CloudTrail Log Updated

Detects updates to an existing CloudTrail trail via UpdateTrail API which may reduce visibility, change destinations, or weaken integrity (e.g., removing global events, moving the S3 destination, or disabling validation). Adversaries can modify trails to evade detection while maintaining a semblance of logging. Validate any configuration change against approved baselines.

Elastic rule (View on GitHub)

  1[metadata]
  2creation_date = "2020/06/10"
  3integration = ["aws"]
  4maturity = "production"
  5updated_date = "2026/01/16"
  6
  7[rule]
  8author = ["Elastic"]
  9description = """
 10Detects updates to an existing CloudTrail trail via UpdateTrail API which may reduce visibility, change destinations, or
 11weaken integrity (e.g., removing global events, moving the S3 destination, or disabling validation). Adversaries can
 12modify trails to evade detection while maintaining a semblance of logging. Validate any configuration change against
 13approved baselines.
 14"""
 15false_positives = [
 16    """
 17    Trail updates may be made by a system or network administrator. Verify whether the user identity, user agent, and/or
 18    hostname should be making changes in your environment. Trail updates from unfamiliar users or hosts should be
 19    investigated. If known behavior is causing false positives, it can be exempted from the rule.
 20    """,
 21]
 22from = "now-6m"
 23index = ["filebeat-*", "logs-aws.cloudtrail-*"]
 24language = "kuery"
 25license = "Elastic License v2"
 26name = "AWS CloudTrail Log Updated"
 27note = """## Triage and analysis
 28
 29### Investigating AWS CloudTrail Log Updated
 30
 31AWS CloudTrail is a service that enables governance, compliance, and operational and risk auditing of your AWS account. It logs API calls and related events, providing visibility into user activity. Trail modifications can be used by attackers to redirect logs to non-approved buckets, drop regions, or disable valuable selectors. This rule identifies a modification on CloudTrail settings using the `UpdateTrail` API. 
 32
 33#### Possible investigation steps
 34- **Actor and context**
 35  - Check `aws.cloudtrail.user_identity.arn`, `user_agent.original`, `source.ip`; verify approved change.
 36- **Assess the modification**
 37  - In `aws.cloudtrail.request_parameters`, note changes to:
 38    - `S3BucketName`, `CloudWatchLogsLogGroupArn`, `KmsKeyId`
 39    - `IsMultiRegionTrail`, `IncludeGlobalServiceEvents`
 40    - Event or insight selectors (management vs data events)
 41- **Correlate**
 42  - Look for preceding `StopLogging` or following `DeleteTrail`.
 43  - Review concurrent IAM policy edits or role changes by the same actor.
 44
 45### False positive analysis
 46- **Planned changes**: Baseline drift during region onboarding or encryption rotation.
 47- **Automation**: IaC pipelines updating trails as templates evolve.
 48
 49### Response and remediation
 50- **If unauthorized**
 51  - Revert to baseline; validate destination ownership and KMS policy.
 52  - Investigate time ranges where visibility may have been reduced.
 53- **Hardening**
 54  - Constrain `cloudtrail:UpdateTrail`, require approvals, and monitor with AWS Config rules.
 55
 56### Additional information
 57- **[AWS IR Playbooks](https://github.com/aws-samples/aws-incident-response-playbooks/blob/c151b0dc091755fffd4d662a8f29e2f6794da52c/playbooks/)** 
 58- **[AWS Customer Playbook Framework](https://github.com/aws-samples/aws-customer-playbook-framework/tree/a8c7b313636b406a375952ac00b2d68e89a991f2/docs)** 
 59- **Security Best Practices:** [AWS Knowledge Center – Security Best Practices](https://aws.amazon.com/premiumsupport/knowledge-center/security-best-practices/).
 60"""
 61references = [
 62    "https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_UpdateTrail.html",
 63    "https://awscli.amazonaws.com/v2/documentation/api/latest/reference/cloudtrail/update-trail.html",
 64]
 65risk_score = 21
 66rule_id = "3e002465-876f-4f04-b016-84ef48ce7e5d"
 67severity = "low"
 68tags = [
 69    "Domain: Cloud",
 70    "Data Source: AWS",
 71    "Data Source: Amazon Web Services",
 72    "Data Source: AWS Cloudtrail",
 73    "Use Case: Log Auditing",
 74    "Resources: Investigation Guide",
 75    "Tactic: Impact",
 76]
 77timestamp_override = "event.ingested"
 78type = "query"
 79
 80query = '''
 81event.dataset: "aws.cloudtrail" 
 82    and event.provider: "cloudtrail.amazonaws.com" 
 83    and event.action: "UpdateTrail" 
 84    and event.outcome: "success"
 85'''
 86
 87
 88[[rule.threat]]
 89framework = "MITRE ATT&CK"
 90[[rule.threat.technique]]
 91id = "T1565"
 92name = "Data Manipulation"
 93reference = "https://attack.mitre.org/techniques/T1565/"
 94[[rule.threat.technique.subtechnique]]
 95id = "T1565.001"
 96name = "Stored Data Manipulation"
 97reference = "https://attack.mitre.org/techniques/T1565/001/"
 98
 99
100
101[rule.threat.tactic]
102id = "TA0040"
103name = "Impact"
104reference = "https://attack.mitre.org/tactics/TA0040/"
105[[rule.threat]]
106framework = "MITRE ATT&CK"
107[[rule.threat.technique]]
108id = "T1530"
109name = "Data from Cloud Storage"
110reference = "https://attack.mitre.org/techniques/T1530/"
111
112
113[rule.threat.tactic]
114id = "TA0009"
115name = "Collection"
116reference = "https://attack.mitre.org/tactics/TA0009/"
117
118[rule.investigation_fields]
119field_names = [
120    "@timestamp",
121    "user.name",
122    "user_agent.original",
123    "source.ip",
124    "aws.cloudtrail.user_identity.arn",
125    "aws.cloudtrail.user_identity.type",
126    "aws.cloudtrail.user_identity.access_key_id",
127    "event.action",
128    "event.outcome",
129    "cloud.account.id",
130    "cloud.region",
131    "aws.cloudtrail.request_parameters",
132    "aws.cloudtrail.response_elements",
133]

Triage and analysis

Investigating AWS CloudTrail Log Updated

AWS CloudTrail is a service that enables governance, compliance, and operational and risk auditing of your AWS account. It logs API calls and related events, providing visibility into user activity. Trail modifications can be used by attackers to redirect logs to non-approved buckets, drop regions, or disable valuable selectors. This rule identifies a modification on CloudTrail settings using the UpdateTrail API.

Possible investigation steps

  • Actor and context
    • Check aws.cloudtrail.user_identity.arn, user_agent.original, source.ip; verify approved change.
  • Assess the modification
    • In aws.cloudtrail.request_parameters, note changes to:
      • S3BucketName, CloudWatchLogsLogGroupArn, KmsKeyId
      • IsMultiRegionTrail, IncludeGlobalServiceEvents
      • Event or insight selectors (management vs data events)
  • Correlate
    • Look for preceding StopLogging or following DeleteTrail.
    • Review concurrent IAM policy edits or role changes by the same actor.

False positive analysis

  • Planned changes: Baseline drift during region onboarding or encryption rotation.
  • Automation: IaC pipelines updating trails as templates evolve.

Response and remediation

  • If unauthorized
    • Revert to baseline; validate destination ownership and KMS policy.
    • Investigate time ranges where visibility may have been reduced.
  • Hardening
    • Constrain cloudtrail:UpdateTrail, require approvals, and monitor with AWS Config rules.

Additional information

References

Related rules

to-top