Skip to content

Commit de8164c

Browse files
committed
Add references to rules (standard_rules)
1 parent 5c73412 commit de8164c

7 files changed

+8
-1
lines changed

rules/standard_rules/admin_assigned.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,9 @@ Severity: Medium
1818
Reports:
1919
MITRE ATT&CK:
2020
- TA0004:T1078
21-
Description: Attaching an audit role manually could be a sign of privilege escalation
21+
Description: Assigning an admin role manually could be a sign of privilege escalation
2222
Runbook: Verify with the user who attached the role or add to a allowlist
23+
Reference: https://medium.com/@gokulelango1040/privilege-escalation-attacks-28a9ef226abb
2324
SummaryAttributes:
2425
- p_any_ip_addresses
2526
Tests:

rules/standard_rules/brute_force_by_ip.yml

+1
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ Reports:
2323
- TA0006:T1110
2424
Description: An actor user was denied login access more times than the configured threshold.
2525
Runbook: Analyze the IP they came from, and other actions taken before/after. Check if a user from this ip eventually authenticated successfully.
26+
Reference: https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks
2627
SummaryAttributes:
2728
- p_any_ip_addresses
2829
Tests:

rules/standard_rules/impossible_travel_login.yml

+1
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ Runbook: >
2121
2222
If the user responds that the geolocation on the new location is incorrect, you can directly
2323
report the inaccuracy via https://ipinfo.io/corrections
24+
Reference: https://expertinsights.com/insights/what-are-impossible-travel-logins/#:~:text=An%20impossible%20travel%20login%20is,of%20the%20logins%20is%20fraudulent.
2425
SummaryAttributes:
2526
- p_any_usernames
2627
- p_any_ip_addresses

rules/standard_rules/malicious_sso_dns_lookup.yml

+1
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Reports:
1919
- TA0001:T1566
2020
Description: The rule looks for DNS requests to sites potentially posing as SSO domains.
2121
Runbook: Verify if the destination domain is owned by your organization.
22+
Reference: https://www.cloudns.net/wiki/article/254/#:~:text=A%20DNS%20query%20(also%20known,associated%20with%20a%20domain%20name.
2223
SummaryAttributes:
2324
- p_any_ip_addresses
2425
Tests:

rules/standard_rules/mfa_disabled.yml

+1
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ Tags:
1515
Reports:
1616
MITRE ATT&CK:
1717
- TA0005:T1556
18+
Reference: https://en.wikipedia.org/wiki/Multi-factor_authentication
1819
Severity: High
1920
Description: Detects when Multi-Factor Authentication (MFA) is disabled
2021
SummaryAttributes:

rules/standard_rules/standard_dns_base64.yml

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ Description: Detects DNS queries with Base64 encoded subdomains, which could ind
44
RuleID: "Standard.DNSBase64"
55
Enabled: false
66
Filename: standard_dns_base64.py
7+
Reference: https://zofixer.com/what-is-base64-disclosure-vulnerability/
78
Severity: Medium
89
DedupPeriodMinutes: 60
910
Threshold: 1

rules/standard_rules/unusual_login_deprecated.yml

+1
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ Runbook: >
2929
Reach out to the user to ensure the login was legitimate. Be sure to use a means outside the one the unusual login originated from, if one is available. CC an individual that works with the user for visibility, usually the user’s manager if they’re available. The second user is not expected to respond, unless they find the response unusual or the location unexpected.
3030
3131
To reduce noise, geolocation history length can be configured in the rule body to increase the number of allowed locations per user.
32+
Reference: https://d3fend.mitre.org/technique/d3f:UserGeolocationLogonPatternAnalysis/
3233
SummaryAttributes:
3334
- p_any_ip_addresses
3435
Tests:

0 commit comments

Comments
 (0)