Managed Sentinel – Alert 013
| Alert ID | MS-A013 |
| Alert Name | Changes made to AWS CloudTrail logs |
| Description | An actor may attempt to obscure their activity and prevent forensics by deleting a trail. Attackers often try to hide their steps by deleting or stopping the collection of logs that could show their activity. This alert identifies any manipulation of AWS CloudTrail logs. |
| Severity Level | Low |
| Threat Indicator | Unauthorized Access |
| MITRE ATT&CK Tactics | Defense Evasion |
| Log sources | AWS Cloud Trail |
| Recommendations | 1. Re-enable AWS Cloud Trail logging 2. Perform an investigation in Azure Sentinel for the same user account, hostname and/or IP address entity to see if any lateral movements were completed. |
