AWS CloudWatch Log Group Deletion for Defense Evasion
Detection of AWS CloudWatch log group deletions via CloudTrail logs, excluding console-based actions, indicating potential defense evasion by attackers attempting to hide their tracks.
Attackers may delete CloudWatch log groups to remove evidence of their activities within an AWS environment. This action, identified through DeleteLogGroup events in CloudTrail, allows them to evade detection and forensic analysis. The activity is detected by monitoring CloudTrail logs for successful log group deletions, excluding those initiated from the AWS console. This behavior is significant because it directly undermines the logging and monitoring infrastructure that defenders rely on for incident response and threat hunting. The original Splunk ES-CU analytic was published in 2026-05-05, but the underlying technique is still relevant.
Attack Chain
- An attacker gains unauthorized access to an AWS account.
- The attacker enumerates existing CloudWatch log groups using AWS CLI or API calls to identify potential targets for deletion.
- The attacker uses compromised credentials or a compromised IAM role to execute the
DeleteLogGroupAPI call via AWS CLI, SDK, or API. - CloudTrail logs the
DeleteLogGroupevent witheventSource = logs.amazonaws.comand a successfulerrorCode. - The attacker may repeat this process for multiple log groups to eliminate a broader range of forensic data.
- The CloudWatch log group is permanently deleted, removing any logs it contained from the defender’s visibility.
- The attacker continues their malicious activities, now with reduced risk of detection due to the absence of relevant logs.
Impact
Successful deletion of CloudWatch log groups allows attackers to operate with significantly reduced visibility. This can lead to delayed incident detection and response, increased dwell time, and greater potential for data exfiltration or system compromise. The deletion of logs hampers forensic investigations, making it difficult to determine the scope and impact of the attack. In environments with strict compliance requirements, such as those governed by HIPAA or PCI DSS, this can lead to significant penalties and reputational damage.
Recommendation
- Deploy the Sigma rule “AWS CloudWatch Log Group Deletion” to your SIEM to detect unauthorized log group deletions using
eventName = DeleteLogGroupandeventSource = logs.amazonaws.com. - Enable AWS CloudTrail logging to capture
DeleteLogGroupevents within your AWS environment. - Investigate any detected
DeleteLogGroupevents, especially those not initiated from the AWS console (userAgent !=console.amazonaws.com), as potential indicators of malicious activity. - Implement strict IAM policies to limit the ability to delete CloudWatch log groups to only authorized personnel.
Detection coverage 2
AWS CloudWatch Log Group Deletion
highDetects the deletion of CloudWatch log groups in AWS, excluding console-based actions.
AWS CloudWatch Log Group Deletion via API
mediumDetects the deletion of CloudWatch log groups in AWS via API calls.
Detection queries are kept inside the platform. Get full rules →