Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update aws.defense-evasion.dns-delete-logs.md with current CloudTrail event name #515

Merged
merged 2 commits into from
May 1, 2024

Conversation

ax-hsmith
Copy link
Contributor

Corrected the AWS CloudTrail Event name for detection

What does this PR do?

  • Correct the KB for aws.defense-evasion.dns-delete-logs to show the current CloudTrail event name

Motivation

  • When detonating this attack, DeleteQueryLoggingConfig does not show up in CloudTrail logs. Instead, the event DeleteResolverQueryLogConfig shows.
image

Corrected the AWS CloudTrail Event name for detection
@christophetd
Copy link
Contributor

Thanks for the contribution!

@christophetd christophetd merged commit c9e7ae3 into DataDog:main May 1, 2024
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants