Skip to content

Commit 21c74e9

Browse files
author
Evan Gibler
authored
Merge branch 'main' into fix/ben/panther_audit_dynamic_params
2 parents 58c7288 + 938c134 commit 21c74e9

29 files changed

+29
-16
lines changed

rules/aws_cloudtrail_rules/abnormally_high_event_volume.yml

+1
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ Filename: abnormally_high_event_volume.py
66
Reports:
77
MITRE ATT&CK:
88
- TA0040:T1499
9+
Reference: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html
910
Severity: Medium
1011
Tests:
1112
- ExpectedResult: false

rules/aws_cloudtrail_rules/aws_ec2_ebs_encryption_disabled.yml

+1
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ Reports:
88
- TA0040:T1486
99
- TA0040:T1565
1010
Runbook: Verify this action was intended and if any EBS volumes were created after the change.
11+
Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default
1112
Severity: Medium
1213
Tests:
1314
- ExpectedResult: true

rules/aws_cloudtrail_rules/aws_ec2_gateway_modified.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Reports:
1717
Severity: Info
1818
Description: An EC2 Network Gateway was modified.
1919
Runbook: https://docs.runpanther.io/alert-runbooks/built-in-rules/aws-ec2-gateway-modified
20-
Reference: reference.link
20+
Reference: https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Internet_Gateway.html
2121
SummaryAttributes:
2222
- eventName
2323
- userAgent

rules/aws_cloudtrail_rules/aws_ec2_manual_security_group_changes.yml

+1
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ Severity: Medium
1717
Description: >
1818
An EC2 security group was manually updated without abiding by the organization's accepted processes. This rule expects organizations to either use the Console, CloudFormation, or Terraform, configurable in the rule's ALLOWED_USER_AGENTS.
1919
Runbook: Identify the actor who changed the security group and validate it was legitimate
20+
Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-security-groups.html
2021
Tests:
2122
-
2223
Name: AWS Console - Ingress SG Authorization

rules/aws_cloudtrail_rules/aws_ec2_monitoring.yml

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ Reports:
77
MITRE ATT&CK:
88
- TA0002:T1204
99
Runbook: Verify that the action was not taken by a malicious actor.
10+
Reference: https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazonec2imagebuilder.html#amazonec2imagebuilder-actions-as-permissions
1011
Severity: Info
1112
Tags:
1213
- ec2

rules/aws_cloudtrail_rules/aws_ec2_network_acl_modified.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Reports:
1717
Severity: Info
1818
Description: An EC2 Network ACL was modified.
1919
Runbook: https://docs.runpanther.io/alert-runbooks/built-in-rules/aws-ec2-network-acl-modified
20-
Reference: reference.link
20+
Reference: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html#nacl-tasks
2121
SummaryAttributes:
2222
- eventName
2323
- userAgent

rules/aws_cloudtrail_rules/aws_ec2_route_table_modified.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Reports:
1616
Severity: Info
1717
Description: An EC2 Route Table was modified.
1818
Runbook: https://docs.runpanther.io/alert-runbooks/built-in-rules/aws-ec2-route-table-modified
19-
Reference: reference.link
19+
Reference: https://docs.aws.amazon.com/vpc/latest/userguide/WorkWithRouteTables.html
2020
SummaryAttributes:
2121
- eventName
2222
- userAgent

rules/aws_cloudtrail_rules/aws_ec2_security_group_modified.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ DedupPeriodMinutes: 720 # 12 hours
1919
Description: >
2020
An EC2 Security Group was modified.
2121
Runbook: https://docs.runpanther.io/alert-runbooks/built-in-rules/aws-ec2-securitygroup-modified
22-
Reference: reference.link
22+
Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-security-groups.html
2323
SummaryAttributes:
2424
- eventName
2525
- userAgent

rules/aws_cloudtrail_rules/aws_ec2_startup_script_change.yml

+1
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ Filename: aws_ec2_startup_script_change.py
66
Reports:
77
MITRE ATT&CK:
88
- TA0002:T1059
9+
Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/user-data.html#user-data-shell-scripts
910
Severity: High
1011
Tests:
1112
- ExpectedResult: false

rules/aws_cloudtrail_rules/aws_ec2_vpc_modified.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Severity: Info
1818
DedupPeriodMinutes: 720 # 12 hours
1919
Description: An EC2 VPC was modified.
2020
Runbook: https://docs.runpanther.io/alert-runbooks/built-in-rules/aws-ec2-vpc-modified
21-
Reference: reference.link
21+
Reference: https://docs.aws.amazon.com/vpc/latest/userguide/configure-your-vpc.html
2222
SummaryAttributes:
2323
- eventName
2424
- userAgent

rules/aws_cloudtrail_rules/aws_ecr_crud.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Reports:
1616
Severity: High
1717
Description: Unauthorized ECR Create, Read, Update, or Delete event occurred.
1818
Runbook: https://docs.aws.amazon.com/AmazonECR/latest/userguide/logging-using-cloudtrail.html
19-
Reference: reference.link
19+
Reference: https://docs.aws.amazon.com/AmazonECR/latest/userguide/security-iam.html#security_iam_authentication
2020
SummaryAttributes:
2121
- eventSource
2222
- eventName

rules/aws_cloudtrail_rules/aws_ecr_events.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Reports:
1414
Severity: High
1515
Description: An ECR event occurred outside of an expected account or region
1616
Runbook: https://docs.aws.amazon.com/AmazonECR/latest/userguide/logging-using-cloudtrail.html
17-
Reference: reference.link
17+
Reference: https://aws.amazon.com/blogs/containers/amazon-ecr-in-multi-account-and-multi-region-architectures/
1818
SummaryAttributes:
1919
- eventSource
2020
- recipientAccountId

rules/aws_cloudtrail_rules/aws_iam_assume_role_blocklist_ignored.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Description: >
1818
A user assumed a role that was explicitly blocklisted for manual user assumption.
1919
Runbook: >
2020
Verify that this was an approved assume role action. If not, consider revoking the access immediately and updating the AssumeRolePolicyDocument to prevent this from happening again.
21-
Reference: reference.link
21+
Reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
2222
SummaryAttributes:
2323
- userAgent
2424
- sourceIpAddress

rules/aws_cloudtrail_rules/aws_iam_entity_created_without_cloudformation.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Description: >
1818
An IAM Entity (Group, Policy, Role, or User) was created manually. IAM entities should be created in code to ensure that permissions are tracked and managed correctly.
1919
Runbook: >
2020
Verify whether IAM entity needs to exist. If so, re-create it in an appropriate CloudFormation, Terraform, or other template. Delete the original manually created entity.
21-
Reference: reference.link
21+
Reference: https://blog.awsfundamentals.com/aws-iam-roles-with-aws-cloudformation
2222
SummaryAttributes:
2323
- userAgent
2424
- sourceIpAddress

rules/aws_cloudtrail_rules/aws_iam_user_key_created.yml

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ Reports:
99
- TA0005:T1108
1010
- TA0005:T1550
1111
- TA0008:T1550
12+
Reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html
1213
Severity: Medium
1314
Tests:
1415
- ExpectedResult: false

rules/aws_cloudtrail_rules/aws_ipset_modified.yml

+1
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ Filename: aws_ipset_modified.py
66
Reports:
77
MITRE ATT&CK:
88
- TA0005:T1562
9+
Reference: https://docs.aws.amazon.com/managedservices/latest/ctref/management-monitoring-guardduty-ip-set-update-review-required.html
910
Severity: High
1011
Tests:
1112
- ExpectedResult: true

rules/aws_cloudtrail_rules/aws_key_compromised.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Tags:
1414
Severity: High
1515
Description: A users static AWS API key was uploaded to a public github repo.
1616
Runbook: Determine the key owner, disable/delete key, and delete the user to resolve the AWS case. If user needs a new IAM give them a stern talking to first.
17-
Reference: N/A
17+
Reference: https://docs.github.com/en/code-security/secret-scanning/about-secret-scanning
1818
Tests:
1919
-
2020
Name: An AWS Access Key was Uploaded to Github

rules/aws_cloudtrail_rules/aws_lambda_crud.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Reports:
1616
Severity: High
1717
Description: Unauthorized lambda Create, Read, Update, or Delete event occurred.
1818
Runbook: https://docs.aws.amazon.com/lambda/latest/dg/logging-using-cloudtrail.html
19-
Reference: reference.link
19+
Reference: https://docs.aws.amazon.com/lambda/latest/dg/logging-using-cloudtrail.html
2020
SummaryAttributes:
2121
- eventSource
2222
- eventName

rules/aws_cloudtrail_rules/aws_network_acl_permissive_entry.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Description: >
1616
A Network ACL entry that allows access from anywhere was added.
1717
Runbook: >
1818
Remove the overly permissive Network ACL entry and add a new entry with more restrictive permissions.
19-
Reference: reference.link
19+
Reference: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html#nacl-rules
2020
SummaryAttributes:
2121
- userAgent
2222
- sourceIpAddress

rules/aws_cloudtrail_rules/aws_rds_master_pass_updated.yml

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ Description: A sensitive database operation that should be performed carefully o
33
DisplayName: "AWS RDS Master Password Updated"
44
Enabled: true
55
Filename: aws_rds_master_pass_updated.py
6+
Reference: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.DBInstance.Modifying.html
67
Severity: Low
78
DedupPeriodMinutes: 60
89
Reports:

rules/aws_cloudtrail_rules/aws_rds_publicrestore.yml

+1
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ Filename: aws_rds_publicrestore.py
66
Reports:
77
MITRE ATT&CK:
88
- TA0010:T1020
9+
Reference: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_RestoreFromSnapshot.html
910
Severity: High
1011
Tests:
1112
- ExpectedResult: false

rules/aws_cloudtrail_rules/aws_resource_made_public.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Description: >
1616
Some AWS resource was made publicly accessible over the internet.
1717
Checks ECR, Elasticsearch, KMS, S3, S3 Glacier, SNS, SQS, and Secrets Manager.
1818
Runbook: Adjust the policy so that the resource is no longer publicly accessible
19-
Reference: reference.link
19+
Reference: https://aws.amazon.com/blogs/security/identifying-publicly-accessible-resources-with-amazon-vpc-network-access-analyzer/
2020
SummaryAttributes:
2121
- userAgent
2222
- sourceIpAddress

rules/aws_cloudtrail_rules/aws_root_console_login.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Reports:
1616
Description: Deprecated. Please see AWS.Console.RootLogin instead.
1717
Runbook: >
1818
Verify that the root login was authorized. If not, investigate the root activity and ensure no malicious activity was performed. Change the root password.
19-
Reference: reference.link
19+
Reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html
2020
SummaryAttributes:
2121
- eventSource
2222
- userAgent

rules/aws_cloudtrail_rules/aws_saml_activity.yml

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ Description: Identifies when SAML activity has occurred in AWS. An adversary cou
33
DisplayName: "AWS SAML Activity"
44
Enabled: true
55
Filename: aws_saml_activity.py
6+
Reference: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-managing-saml-idp-console.html
67
Severity: Medium
78
Tests:
89
- ExpectedResult: true

rules/aws_cloudtrail_rules/aws_security_configuration_change.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Reports:
1515
Description: An account wide security configuration was changed.
1616
Runbook: >
1717
Verify that this change was planned. If not, revert the change and update the access control policies to ensure this doesn't happen again.
18-
Reference: reference.link
18+
Reference: https://docs.aws.amazon.com/prescriptive-guidance/latest/aws-startup-security-baseline/controls-acct.html
1919
SummaryAttributes:
2020
- eventName
2121
- userAgent

rules/aws_cloudtrail_rules/aws_securityhub_finding_evasion.yml

+1
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ Filename: aws_securityhub_finding_evasion.py
66
Reports:
77
MITRE ATT&CK:
88
- TA0005:T1562
9+
Reference: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-insights-view-take-action.html
910
Severity: High
1011
Tests:
1112
- ExpectedResult: false

rules/aws_cloudtrail_rules/aws_snapshot_backup_exfiltration.yml

+1
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ Filename: aws_snapshot_backup_exfiltration.py
66
Reports:
77
MITRE ATT&CK:
88
- TA0010:T1537
9+
Reference: https://docs.aws.amazon.com/prescriptive-guidance/latest/backup-recovery/ec2-backup.html
910
Severity: Medium
1011
Tests:
1112
- ExpectedResult: true

rules/aws_cloudtrail_rules/aws_snapshot_made_public.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Reports:
1414
Severity: Medium
1515
Description: An AWS storage snapshot was made public.
1616
Runbook: Adjust the snapshot configuration so that it is no longer public.
17-
Reference: reference.link
17+
Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-modifying-snapshot-permissions.html
1818
SummaryAttributes:
1919
- userAgent
2020
- sourceIpAddress

rules/aws_cloudtrail_rules/aws_user_login_profile_modified.yml

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ Reports:
99
- TA0005:T1108
1010
- TA0005:T1550
1111
- TA0008:T1550
12+
Reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_examples_aws_my-sec-creds-self-manage-pass-accesskeys-ssh.html
1213
Severity: High
1314
Tests:
1415
- ExpectedResult: false

0 commit comments

Comments
 (0)