Importance and Impact:
To determine whether a log file was modified, deleted, or unchanged after CloudTrail delivered it, you can use CloudTrail log file integrity validation. This feature is built using industry standard algorithms: SHA-256 for hashing and SHA-256 with RSA for digital signing.
In case of compromise, first thing malicious actor would do is to turn off the cloudtrail and temper cloudtrail log files which poses security risks that prevent identifying origination of the attack source
Recommendations:
1/ Turn on CloudTrail log file validation so that any changes made to the log file itself after it has been delivered to the S3 bucket is trackable to ensure log file integrity.
2/ Minimize access to the CloudTrail API. Revoke permissions for DeleteTrail, StopLogging, UpdateTrail
3/ This ensures cloudtrail logs cannot be tempered in case of compromise and ensures to identify reason of compromise
Importance and Impact: To determine whether a log file was modified, deleted, or unchanged after CloudTrail delivered it, you can use CloudTrail log file integrity validation. This feature is built using industry standard algorithms: SHA-256 for hashing and SHA-256 with RSA for digital signing.
In case of compromise, first thing malicious actor would do is to turn off the cloudtrail and temper cloudtrail log files which poses security risks that prevent identifying origination of the attack source
Recommendations: 1/ Turn on CloudTrail log file validation so that any changes made to the log file itself after it has been delivered to the S3 bucket is trackable to ensure log file integrity.
2/ Minimize access to the CloudTrail API. Revoke permissions for DeleteTrail, StopLogging, UpdateTrail
3/ This ensures cloudtrail logs cannot be tempered in case of compromise and ensures to identify reason of compromise