Files
blue-team-tools/rules/cloud/aws/cloudtrail/aws_securityhub_finding_evasion.yml
T

31 lines
850 B
YAML
Raw Normal View History

title: AWS SecurityHub Findings Evasion
2021-06-28 15:42:34 +07:00
id: a607e1fe-74bf-4440-a3ec-b059b9103157
status: stable
2021-06-29 12:49:32 +02:00
description: Detects the modification of the findings on SecurityHub.
2021-06-28 15:52:42 +07:00
references:
2021-06-28 15:42:34 +07:00
- https://docs.aws.amazon.com/cli/latest/reference/securityhub/
2022-10-25 07:34:10 +02:00
author: Sittikorn S
date: 2021-06-28
2021-06-28 15:42:34 +07:00
tags:
- attack.defense-evasion
2021-06-28 15:57:21 +07:00
- attack.t1562
2021-06-28 15:42:34 +07:00
logsource:
2021-11-14 09:56:59 +01:00
product: aws
2021-06-28 15:42:34 +07:00
service: cloudtrail
detection:
selection:
eventSource: securityhub.amazonaws.com
eventName:
2022-10-25 07:34:10 +02:00
- 'BatchUpdateFindings'
- 'DeleteInsight'
- 'UpdateFindings'
- 'UpdateInsight'
2021-06-28 15:42:34 +07:00
condition: selection
fields:
- sourceIPAddress
- userIdentity.arn
falsepositives:
- System or Network administrator behaviors
- DEV, UAT, SAT environment. You should apply this rule with PROD environment only.
level: high