Disable or Modify Cloud Logs
An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an adversary has sufficient permissions, they can disable or modify logging to avoid detection of their activities. For example, in AWS an adversary may disable CloudWatch/CloudTrail ...
BY SOURCE
PROCEDURES (19)
Auto-extracted: 6 detections for cloud
Auto-extracted: 4 detections for api
Auto-extracted: 4 detections for service
Auto-extracted: 3 detections for aws
Auto-extracted: 3 detections for general monitoring
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 3 detections for evasion
Auto-extracted: 2 detections for encrypt
Auto-extracted: 2 detections for azure
Auto-extracted: 2 detections for c2
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for inject
Auto-extracted: 2 detections for cloud monitoring
Auto-extracted: 1 detections for office
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for office
Auto-extracted: 1 detections for container