34c5d66c22
chore: update mitre tags to use attack v19
28 lines
800 B
YAML
28 lines
800 B
YAML
title: AWS SecurityHub Findings Evasion
|
|
id: a607e1fe-74bf-4440-a3ec-b059b9103157
|
|
status: stable
|
|
description: Detects the modification of the findings on SecurityHub.
|
|
references:
|
|
- https://docs.aws.amazon.com/cli/latest/reference/securityhub/
|
|
author: Sittikorn S
|
|
date: 2021-06-28
|
|
tags:
|
|
- attack.defense-impairment
|
|
- attack.t1685
|
|
logsource:
|
|
product: aws
|
|
service: cloudtrail
|
|
detection:
|
|
selection:
|
|
eventSource: securityhub.amazonaws.com
|
|
eventName:
|
|
- 'BatchUpdateFindings'
|
|
- 'DeleteInsight'
|
|
- 'UpdateFindings'
|
|
- 'UpdateInsight'
|
|
condition: selection
|
|
falsepositives:
|
|
- System or Network administrator behaviors
|
|
- DEV, UAT, SAT environment. You should apply this rule with PROD environment only.
|
|
level: high
|