Skip to main content

AWS CloudTrail event selector does not cover all management events

ID:aws_cloudtrail_event_selector_coverage_limited
Data type:AWS CloudTrail
Severity:
Low
MITRE ATT&CK:TA0005:T1562.007

Description

AlphaSOC detected limited coverage of management events in Amazon CloudTrail event selectors. CloudTrail provides audit logs of account activity and API usage for security analysis and compliance purposes. Restricting management event logging can reduce visibility into administrative operations and potentially mask unauthorized actions.

Impact

Incomplete CloudTrail coverage creates blind spots in account monitoring, potentially allowing adversaries to make unauthorized changes without generating logs. These changes may include privilege escalation, infrastructure modification, or data exfiltration. Gaps in logging can hamper incident response and complicate forensic investigations. They may also lead to compliance issues due to insufficient audit trails.

Severity

SeverityCondition
Low
AWS CloudTrail event selector not covering all management events

Investigation and Remediation

Review CloudTrail configurations across all regions to identify those lacking full management event coverage. Examine the preceding AWS activity to determine whether the change was authorized. Configure comprehensive logging for management events, implement configuration baselines using AWS Config or Service Control Policies. Monitor for configuration changes, and consider implementing automated remediation if critical logging settings are modified.

Known False Positives

  • Event filtering for high-volume API calls that generate excessive log entries