-
Notifications
You must be signed in to change notification settings - Fork 522
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Rule Tuning] Add Investigation Fields to Specific AWS Rules #4261
[Rule Tuning] Add Investigation Fields to Specific AWS Rules #4261
Conversation
Enhancement - GuidelinesThese guidelines serve as a reminder set of considerations when addressing adding a new schema feature to the code. Documentation and Context
Code Standards and Practices
Testing
Additional Schema Related Checks
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Relook at Rule minstack
rules/cross-platform/execution_aws_ssm_sendcommand_with_command_parameters.toml
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Submitting about half of my review now, I will continue to review later today!
rules/integrations/aws/defense_evasion_cloudtrail_logging_deleted.toml
Outdated
Show resolved
Hide resolved
rules/integrations/aws/defense_evasion_cloudtrail_logging_deleted.toml
Outdated
Show resolved
Hide resolved
rules/integrations/aws/defense_evasion_cloudtrail_logging_deleted.toml
Outdated
Show resolved
Hide resolved
rules/integrations/aws/discovery_ec2_multi_region_describe_instances.toml
Outdated
Show resolved
Hide resolved
rules/integrations/aws/discovery_ec2_multiple_discovery_api_calls_via_cli.toml
Show resolved
Hide resolved
rules/integrations/aws/discovery_new_terms_sts_getcalleridentity.toml
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These look good! I think the order change would be ideal but the fields look good. Added source.address to a few
rules/integrations/aws/execution_ssm_command_document_created_by_rare_user.toml
Outdated
Show resolved
Hide resolved
field_names = [ | ||
"failed_requests", | ||
"tls.client.server_name", | ||
"source.address", | ||
"cloud.account.id" | ||
] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we have no way of showing the actor for this? Both for the rule and the higlighted fields? Or is this rule only interested in the details of the bucket itself?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can only show the fields available after the aggregation unfortunately. You could add source.address to timeline then add the event.action and find out, but in the alert document, it would not be there.
rules/integrations/aws/persistence_ec2_security_group_configuration_change_detection.toml
Outdated
Show resolved
Hide resolved
rules/integrations/aws/persistence_iam_create_user_via_assumed_role_on_ec2_instance.toml
Outdated
Show resolved
Hide resolved
rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml
Show resolved
Hide resolved
rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml
Outdated
Show resolved
Hide resolved
...s/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml
Outdated
Show resolved
Hide resolved
...s/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml
Outdated
Show resolved
Hide resolved
rules/integrations/aws/privilege_escalation_iam_customer_managed_policy_attached_to_role.toml
Outdated
Show resolved
Hide resolved
rules/integrations/aws/privilege_escalation_role_assumption_by_service.toml
Outdated
Show resolved
Hide resolved
* adding investigation fields to specific aws rules * updated patch * removing min-stack requirements * removed user.name redundancy * adjusted order of investigation fields * adding source address Removed changes from: - rules/integrations/aws/discovery_ec2_multiple_discovery_api_calls_via_cli.toml - rules/integrations/aws/impact_aws_s3_bucket_enumeration_or_brute_force.toml - rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml - rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml - rules/integrations/aws_bedrock/aws_bedrock_multiple_attempts_to_use_denied_models_by_user.toml - rules/integrations/aws_bedrock/aws_bedrock_multiple_validation_exception_errors_by_single_user.toml (selectively cherry picked from commit ef453d8)
* adding investigation fields to specific aws rules * updated patch * removing min-stack requirements * removed user.name redundancy * adjusted order of investigation fields * adding source address Removed changes from: - rules/integrations/aws/discovery_ec2_multiple_discovery_api_calls_via_cli.toml - rules/integrations/aws/impact_aws_s3_bucket_enumeration_or_brute_force.toml - rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml - rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml - rules/integrations/aws_bedrock/aws_bedrock_multiple_attempts_to_use_denied_models_by_user.toml - rules/integrations/aws_bedrock/aws_bedrock_multiple_validation_exception_errors_by_single_user.toml (selectively cherry picked from commit ef453d8)
* adding investigation fields to specific aws rules * updated patch * removing min-stack requirements * removed user.name redundancy * adjusted order of investigation fields * adding source address (cherry picked from commit ef453d8)
* adding investigation fields to specific aws rules * updated patch * removing min-stack requirements * removed user.name redundancy * adjusted order of investigation fields * adding source address (cherry picked from commit ef453d8)
* adding investigation fields to specific aws rules * updated patch * removing min-stack requirements * removed user.name redundancy * adjusted order of investigation fields * adding source address (cherry picked from commit ef453d8)
* adding investigation fields to specific aws rules * updated patch * removing min-stack requirements * removed user.name redundancy * adjusted order of investigation fields * adding source address (cherry picked from commit ef453d8)
Pull Request
Issue link(s):
Summary - What I changed
Adds investigation (highlighted) fields to specific AWS rules.
How To Test
Checklist
bug
,enhancement
,schema
,maintenance
,Rule: New
,Rule: Deprecation
,Rule: Tuning
,Hunt: New
, orHunt: Tuning
so guidelines can be generatedmeta:rapid-merge
label if planning to merge within 24 hoursContributor checklist