2021-06-28 15:45:31 +07:00
|
|
|
title: AWS SecurityHub Findings Evasion
|
2021-06-28 15:42:34 +07:00
|
|
|
id: a607e1fe-74bf-4440-a3ec-b059b9103157
|
|
|
|
|
status: stable
|
2021-06-29 12:49:32 +02:00
|
|
|
description: Detects the modification of the findings on SecurityHub.
|
2021-06-28 15:52:42 +07:00
|
|
|
references:
|
2021-06-28 15:42:34 +07:00
|
|
|
- https://docs.aws.amazon.com/cli/latest/reference/securityhub/
|
2022-10-25 07:34:10 +02:00
|
|
|
author: Sittikorn S
|
|
|
|
|
date: 2021/06/28
|
2021-06-28 15:42:34 +07:00
|
|
|
tags:
|
2021-06-28 16:07:54 +07:00
|
|
|
- attack.defense_evasion
|
2021-06-28 15:57:21 +07:00
|
|
|
- attack.t1562
|
2021-06-28 15:42:34 +07:00
|
|
|
logsource:
|
2021-11-14 09:56:59 +01:00
|
|
|
product: aws
|
2021-06-28 15:42:34 +07:00
|
|
|
service: cloudtrail
|
|
|
|
|
detection:
|
|
|
|
|
selection:
|
|
|
|
|
eventSource: securityhub.amazonaws.com
|
|
|
|
|
eventName:
|
2022-10-25 07:34:10 +02:00
|
|
|
- 'BatchUpdateFindings'
|
|
|
|
|
- 'DeleteInsight'
|
|
|
|
|
- 'UpdateFindings'
|
|
|
|
|
- 'UpdateInsight'
|
2021-06-28 15:42:34 +07:00
|
|
|
condition: selection
|
|
|
|
|
fields:
|
|
|
|
|
- sourceIPAddress
|
|
|
|
|
- userIdentity.arn
|
|
|
|
|
falsepositives:
|
|
|
|
|
- System or Network administrator behaviors
|
|
|
|
|
- DEV, UAT, SAT environment. You should apply this rule with PROD environment only.
|
|
|
|
|
level: high
|