T1070.002 Clear Linux or Mac System Logs

Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. The majority of native system logging is stored under the <code>/var/log/</code> directory. Subfolders in this directory categorize logs by their related functions, such as:(Citation: Linux Logs)

  • <code>/var/log/messages:</code>: General and system-related messages
  • <code>/var/log/secure</code> or <code>/var/log/auth.log</code>: Authentication logs
  • <code>/var/log/utmp</code> or <code>/var/log/wtmp</code>: Login records
  • <code>/var/log/kern.log</code>: Kernel logs
  • <code>/var/log/cron.log</code>: Crond logs
  • <code>/var/log/maillog</code>: Mail server logs
  • <code>/var/log/httpd/</code>: Web server access and error logs
View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.PS-01.06 Encryption management practices Mitigates T1070.002 Clear Linux or Mac System Logs
Comments
This diagnostic statement is associated with employing encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. To address threats to the removal of Linux or Mac System Logs, obfuscate/encrypt event files locally and in transit to avoid giving feedback to an adversary.
References
    PR.PS-01.07 Cryptographic keys and certificates Mitigates T1070.002 Clear Linux or Mac System Logs
    Comments
    This diagnostic statement protects against Clear Linux or Mac System Logs through the use of key management. Employing key protection strategies for key material used in protection of event logs, limitations to specific accounts along with access control mechanisms provides protection against adversaries trying to clear system logs.
    References
      ID.AM-08.03 Data governance and lifecycle management Mitigates T1070.002 Clear Linux or Mac System Logs
      Comments
      Utilizing methods that can obfuscate and/or encrypt event files locally and in transit can prevent adversaries from clearing system logs and feeding them to adversaries. Also, storing data remotely can be used to properly manage data. There may be some similarities to NIST 800-53 SI-12 Information Management and Retention. This may provide mitigation of data access/exfiltration techniques.
      References
        ID.AM-08.05 Data destruction procedures Mitigates T1070.002 Clear Linux or Mac System Logs
        Comments
        Utilizing methods that can obfuscate and/or encrypt event files locally and in transit can prevent adversaries from clearing system logs and feeding them to adversaries. Also, storing data remotely can be used to properly manage data. There may be some similarities to NIST 800-53 SI-12 Information Management and Retention. This may provide mitigation of data access/exfiltration techniques.
        References
          PR.PS-01.05 Encryption standards Mitigates T1070.002 Clear Linux or Mac System Logs
          Comments
          This diagnostic statement is associated with employing strong encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. To address threats to the removal of Linux or Mac System Logs, obfuscate/encrypt event files locally and in transit to avoid giving feedback to an adversary.
          References

            NIST 800-53 Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            CA-07 Continuous Monitoring mitigates T1070.002 Clear Linux or Mac System Logs
            CM-06 Configuration Settings mitigates T1070.002 Clear Linux or Mac System Logs
            AC-17 Remote Access mitigates T1070.002 Clear Linux or Mac System Logs
            CP-07 Alternate Processing Site mitigates T1070.002 Clear Linux or Mac System Logs
            CP-06 Alternate Storage Site mitigates T1070.002 Clear Linux or Mac System Logs
            SC-36 Distributed Processing and Storage mitigates T1070.002 Clear Linux or Mac System Logs
            SI-23 Information Fragmentation mitigates T1070.002 Clear Linux or Mac System Logs
            CP-09 System Backup mitigates T1070.002 Clear Linux or Mac System Logs
            AC-19 Access Control for Mobile Devices mitigates T1070.002 Clear Linux or Mac System Logs
            SC-04 Information in Shared System Resources mitigates T1070.002 Clear Linux or Mac System Logs
            SI-12 Information Management and Retention mitigates T1070.002 Clear Linux or Mac System Logs
            SI-03 Malicious Code Protection mitigates T1070.002 Clear Linux or Mac System Logs
            SI-07 Software, Firmware, and Information Integrity mitigates T1070.002 Clear Linux or Mac System Logs
            AC-16 Security and Privacy Attributes mitigates T1070.002 Clear Linux or Mac System Logs
            AC-18 Wireless Access mitigates T1070.002 Clear Linux or Mac System Logs
            CM-02 Baseline Configuration mitigates T1070.002 Clear Linux or Mac System Logs
            SI-04 System Monitoring mitigates T1070.002 Clear Linux or Mac System Logs
            AC-02 Account Management mitigates T1070.002 Clear Linux or Mac System Logs
            AC-03 Access Enforcement mitigates T1070.002 Clear Linux or Mac System Logs
            AC-05 Separation of Duties mitigates T1070.002 Clear Linux or Mac System Logs
            AC-06 Least Privilege mitigates T1070.002 Clear Linux or Mac System Logs

            VERIS Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            attribute.integrity.variety.Log tampering Log tampering or modification related-to T1070.002 Clear Linux or Mac System Logs

            Azure Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            alerts_for_linux_machines Alerts for Linux Machines technique_scores T1070.002 Clear Linux or Mac System Logs
            Comments
            This control may alert on possible log tampering activity, including deletion of logs. No documentation is provided on which log sources are targeted by this control.
            References

            GCP Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            google_secops Google Security Operations technique_scores T1070.002 Clear Linux or Mac System Logs
            Comments
            Google Security Ops is able to trigger an alert based on system events, such as deletion of cloud audit logs. This technique was scored as minimal based on low or uncertain detection coverage factor. https://github.com/chronicle/detection-rules/blob/main/gcp_cloudaudit/gcp_log_deletion.yaral
            References

            AWS Mappings

            Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
            amazon_inspector Amazon Inspector technique_scores T1070.002 Clear Linux or Mac System Logs
            Comments
            The Amazon Inspector Best Practices assessment package can assess security control "Configure permissions for system directories" that prevents privilege escalation by local users and ensures only the root account can modify/execute system configuration information and binaries. Amazon Inspector does not directly protect against system modifications rather it just checks to see if security controls are in place which can inform decisions around hardening the system. Due to this and the fact the security control is only supported for Linux platforms, the score is Minimal.
            References

              M365 Mappings

              Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
              PUR-AUS-E5 Audit Solutions Technique Scores T1070.002 Clear Linux or Mac System Logs
              Comments
              Microsoft Purview auditing solutions provide an integrated solution to help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. Thousands of user and admin operations performed in dozens of Microsoft 365 services and solutions are captured, recorded, and retained in your organization's unified audit log. Audit records for these events are searchable by security ops, IT admins, insider risk teams, and compliance and legal investigators in your organization. This capability provides visibility into the activities performed across your Microsoft 365 organization. Microsoft's Audit Solutions detects Indicator Removal attacks due to the File and Page Audit Log activities which monitors for newly constructed files, for contextual data about files, and for changes made to files. License Requirements: Microsoft 365 E3 and E5
              References
              PUR-INPR-E5 Information Protection Technique Scores T1070.002 Clear Linux or Mac System Logs
              Comments
              Defender for Cloud Apps file policies allow you to enforce a wide range of automated processes. Policies can be set to provide Information Protection, including continuous compliance scans, legal eDiscovery tasks, and DLP for sensitive content shared publicly. Information Protection Protects from Indicator Removal attacks due to it encrypting files containing personally identifying information and other sensitive data that is shared in a cloud app and applying sensitivity labels to limit access only to employees in your company. License Requirements: Microsoft Defender for Office 365 plan 1 and plan 2
              References