T1562.008

Disable or Modify Cloud Logs

An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an adversary has sufficient permissions, they can disable or modify logging to avoid detection of their activities. For example, in AWS an adversary may disable CloudWatch/CloudTrail integrations prior to conducting further malicious activity. They may alternatively tamper with logging functionality by removing associated SNS topics, disabling multi-region logging, or disabling settings that validate and/or encrypt log files. In Office 365, an adversary may disable logging on mail collection activities for specific users by using the Set-MailboxAuditBypassAssociation cmdlet, by disabling M365 Advanced Auditing for the user, or by downgrading the user's license from an Enterprise E5 to an Enterprise E3 license.

Microsoft Sentinel / Defender
kusto
let CloudTrailTampering = dynamic([
  "StopLogging", "DeleteTrail", "UpdateTrail",
  "PutEventSelectors", "RemoveTargets", "DeleteFlowLogs",
  "DeleteDetector", "DeleteMembers",
  "DisableOrganizationAdminAccount"
]);
let AzureDiagTampering = dynamic([
  "MICROSOFT.INSIGHTS/DIAGNOSTICSETTINGS/DELETE",
  "MICROSOFT.INSIGHTS/DIAGNOSTICSETTINGS/WRITE",
  "MICROSOFT.SECURITY/SECURITYCONTACTS/DELETE"
]);
let M365AuditTampering = dynamic([
  "Set-MailboxAuditBypassAssociation",
  "Set-AdminAuditLogConfig",
  "Disable-OrganizationCustomization",
  "Set-OrganizationConfig"
]);
union
(
  AuditLogs
  | where TimeGenerated > ago(24h)
  | where OperationName has_any (AzureDiagTampering)
  | project TimeGenerated, OperationName, Identity,
           Result, TargetResources, CorrelationId
),
(
  OfficeActivity
  | where TimeGenerated > ago(24h)
  | where Operation has_any (M365AuditTampering)
  | project TimeGenerated, Operation, UserId,
           ResultStatus, ClientIP, Parameters
),
(
  AWSCloudTrail
  | where TimeGenerated > ago(24h)
  | where EventName has_any (CloudTrailTampering)
  | project TimeGenerated, EventName, UserIdentityArn,
           SourceIpAddress, AWSRegion, ErrorCode,
           RequestParameters
)
| sort by TimeGenerated desc
high severity high confidence

Data Sources

Cloud Service: Cloud Service Modification Application Log: Application Log Content User Account: User Account Modification

Required Tables

AWSCloudTrail AuditLogs OfficeActivity

False Positives

  • Cloud administrators legitimately reconfiguring CloudTrail to consolidate trails during an AWS Organization migration or cost optimization exercise
  • Azure DevOps pipelines that programmatically update diagnostic settings as part of infrastructure-as-code deployments (Terraform, Bicep)
  • IT administrators using Set-MailboxAuditBypassAssociation for legitimate service accounts that generate excessive audit noise (e.g., migration tools, backup agents)
  • Security teams temporarily modifying GuardDuty or Security Center settings during a planned penetration test with a signed rules-of-engagement

Unlock Pro Content

Get the full detection package for T1562.008 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections