Skip to main content

CCC.Core.TH07: Logs are Tampered With or Deleted

Threat ID:CCC.Core.TH07
Title:Logs are Tampered With or Deleted
Description:

Tampering or deletion of service logs will reduce the system's ability to maintain an accurate record of events. Any actions that compromise the integrity of logs could disrupt system availability by disrupting monitoring, hindering forensic investigations, and reducing the accuracy of audit trails.

Related Capabilities

IDTitleDescription
CCC.Core.F03Access Log PublicationThe service automatically publishes structured, verbose records of activities performed within the scope of the service by external actors.
CCC.Core.F10Log PublicationThe service automatically publishes structured, verbose records of activities, operations, or events that occur within the service.

External Mappings

Reference IDEntry IDStrengthRemarks
MITRE-ATT&CK
T1070
0
Indicator Removal on Host
MITRE-ATT&CK
T1565
0
Data Manipulation (for altering log entries)
MITRE-ATT&CK
T1027
0
Obfuscated Files or Information

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.AuditLog.C01Implement Digital Signatures With Hash ChainingDigital signatures allows for external verification of log data tampering and hash chaining allows for deleted log files to be detected. Integrity
2
2
2
CCC.AuditLog.C03Alert On Audit Log Changes And AccessEnsure that specific alerts have been configured to detect changes in audit log configuration such as disabling exporting of logs. Alerts MUST also be created to detect changes in retention/object lock policies for exported data log sources/buckets. Integrity
1
3
2
CCC.AuditLog.C05Export Audit Logs To BucketConfigure audit logs to be sent to a external bucket where they can be globally replicated and can be subject to greater access control and data retention polices. Availability
1
4
1
CCC.AuditLog.C06Enforce Retention Policy on Audit Log BucketConfigure a custom retention policy on the designated audit log bucket to ensure that logs are retained for the correct number of days as defined by your organization's policy. Availability
2
3
1
CCC.AuditLog.C07Enforce MFA Delete on Audit Log BucketEnable Multi-Factor Authentication (MFA) delete on the audit log bucket to provide greater protection against accidental or malicious deletion of audit data. Availability
2
3
1
CCC.AuditLog.C08Enable Object Lock On Audit Log BucketEnsure that object log is enabled globally on all objects with the bucket. The lock time MUST be configured to meet your organization, legal and compliance goals. Deletion attempts before the lock period MUST be denied. Availability
1
3
1
CCC.AuditLog.C09Restrict Field And Log Type AccessConfigure access to audit logs to follow the principle of least privilege in particular where technically possible limit the log fields users have access to to prevent accidental exposure to sensitive information such as PII. Confidentiality
1
7
1
CCC.Core.C09Ensure Integrity of Access LogsEnsure that access logs are always recorded to an external location that cannot be manipulated from the context of the service(s) it contains logs for. Data
3
5
3