Skip to content

Commit 01b1e8b

Browse files
bm11100rw-access
andauthored
[Rule Tuning] Update Tags for Cloud Rules (#99)
* [Rule Tuning] Update Tags for Cloud Rules * commenting out specifying alphabetical tag order in rule formatter * Update rule_formatter.py * py lint * Lint fix comments * update modified dates * Update credential_access_secretsmanager_getsecretvalue.toml * adding Continuous Monitoring tag * update tags * fixed and in tags Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>
1 parent 7efe33e commit 01b1e8b

File tree

50 files changed

+105
-104
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+105
-104
lines changed

detection_rules/rule_formatter.py

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -142,10 +142,11 @@ def _do_write(_data, _contents):
142142
# but will at least purge extraneous white space
143143
query = contents['rule'].pop('query', '').strip()
144144

145-
tags = contents['rule'].get("tags", [])
146-
147-
if tags and isinstance(tags, list):
148-
contents['rule']["tags"] = list(sorted(set(tags)))
145+
# - As tags are expanding, we may want to reconsider the need to have them in alphabetical order
146+
# tags = contents['rule'].get("tags", [])
147+
#
148+
# if tags and isinstance(tags, list):
149+
# contents['rule']["tags"] = list(sorted(set(tags)))
149150

150151
top = OrderedDict()
151152
bottom = OrderedDict()

rules/aws/collection_cloudtrail_logging_created.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/06/10"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/07"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ references = [
2828
risk_score = 21
2929
rule_id = "594e0cbf-86cc-45aa-9ff7-ff27db27d3ed"
3030
severity = "low"
31-
tags = ["AWS", "Elastic"]
31+
tags = ["AWS", "Elastic", "SecOps", "Logging", "Continuous Monitoring"]
3232
type = "query"
3333

3434
query = '''

rules/aws/credential_access_aws_iam_assume_role_brute_force.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/07/16"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/16"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -24,7 +24,7 @@ references = [
2424
risk_score = 47
2525
rule_id = "ea248a02-bc47-4043-8e94-2885b19b2636"
2626
severity = "medium"
27-
tags = ["AWS", "Elastic"]
27+
tags = ["AWS", "Elastic", "SecOps", "Identity and Access", "Continuous Monitoring"]
2828
type = "threshold"
2929

3030
query = '''

rules/aws/credential_access_iam_user_addition_to_group.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/06/04"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/07"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -26,7 +26,7 @@ references = ["https://docs.aws.amazon.com/IAM/latest/APIReference/API_AddUserTo
2626
risk_score = 21
2727
rule_id = "333de828-8190-4cf5-8d7c-7575846f6fe0"
2828
severity = "low"
29-
tags = ["AWS", "Elastic"]
29+
tags = ["AWS", "Elastic", "SecOps", "Identity and Access", "Continuous Monitoring"]
3030
type = "query"
3131

3232
query = '''

rules/aws/credential_access_secretsmanager_getsecretvalue.toml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/07/06"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/06"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Nick Jones", "Elastic"]
@@ -27,10 +27,10 @@ references = [
2727
"https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html",
2828
"http://detectioninthe.cloud/credential_access/access_secret_in_secrets_manager/",
2929
]
30-
risk_score = 21
30+
risk_score = 73
3131
rule_id = "a00681e3-9ed6-447c-ab2c-be648821c622"
32-
severity = "low"
33-
tags = ["AWS", "Elastic"]
32+
severity = "high"
33+
tags = ["AWS", "Elastic", "SecOps", "Data Protection", "Continuous Monitoring"]
3434
type = "query"
3535

3636
query = '''

rules/aws/defense_evasion_cloudtrail_logging_deleted.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/05/26"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/07"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ references = [
2828
risk_score = 47
2929
rule_id = "7024e2a0-315d-4334-bb1a-441c593e16ab"
3030
severity = "medium"
31-
tags = ["AWS", "Elastic"]
31+
tags = ["AWS", "Elastic", "SecOps", "Logging", "Continuous Monitoring"]
3232
type = "query"
3333

3434
query = '''

rules/aws/defense_evasion_cloudtrail_logging_suspended.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/06/10"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/07"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -32,7 +32,7 @@ references = [
3232
risk_score = 47
3333
rule_id = "1aa8fa52-44a7-4dae-b058-f3333b91c8d7"
3434
severity = "medium"
35-
tags = ["AWS", "Elastic"]
35+
tags = ["AWS", "Elastic", "SecOps", "Logging", "Continuous Monitoring"]
3636
type = "query"
3737

3838
query = '''

rules/aws/defense_evasion_cloudwatch_alarm_deletion.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/06/15"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/07"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ references = [
2828
risk_score = 47
2929
rule_id = "f772ec8a-e182-483c-91d2-72058f76a44c"
3030
severity = "medium"
31-
tags = ["AWS", "Elastic"]
31+
tags = ["AWS", "Elastic", "SecOps", "Monitoring", "Continuous Monitoring"]
3232
type = "query"
3333

3434
query = '''

rules/aws/defense_evasion_config_service_rule_deletion.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/06/26"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/07"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -32,7 +32,7 @@ references = [
3232
risk_score = 47
3333
rule_id = "7024e2a0-315d-4334-bb1a-552d604f27bc"
3434
severity = "medium"
35-
tags = ["AWS", "Elastic"]
35+
tags = ["AWS", "Elastic", "SecOps", "Monitoring", "Continuous Monitoring"]
3636
type = "query"
3737

3838
query = '''

rules/aws/defense_evasion_configuration_recorder_stopped.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/06/16"
33
ecs_version = ["1.5.0"]
44
maturity = "production"
5-
updated_date = "2020/07/07"
5+
updated_date = "2020/07/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ references = [
2828
risk_score = 73
2929
rule_id = "fbd44836-0d69-4004-a0b4-03c20370c435"
3030
severity = "high"
31-
tags = ["AWS", "Elastic"]
31+
tags = ["AWS", "Elastic", "SecOps", "Monitoring", "Continuous Monitoring"]
3232
type = "query"
3333

3434
query = '''

0 commit comments

Comments
 (0)