[New Rule] GCP Firewall Rule Created (#312)

* new-rule-gcp-firewall-rule-created

* Add FP info to rule

* Add ATT&CK metadata

* Update name to align with other rules

Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>

Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>
This commit is contained in:
David French
2020-09-24 09:27:41 -06:00
committed by GitHub
parent 6e61be64b2
commit 01c904f2dd
@@ -0,0 +1,49 @@
[metadata]
creation_date = "2020/09/21"
ecs_version = ["1.6.0"]
maturity = "production"
updated_date = "2020/09/21"
[rule]
author = ["Elastic"]
description = """
Identifies when a firewall rule is created in Google Cloud Platform (GCP). Virtual Private Cloud (VPC) firewall rules
can be configured to allow or deny connections to or from virtual machine (VM) instances. An adversary may create a new
firewall rule in order to weaken their target's security controls and allow more permissive ingress or egress traffic
flows for their benefit.
"""
false_positives = [
"""
Firewall rules may be created by system administrators. Verify that the firewall configuration change was expected.
Exceptions can be added to this rule to filter expected behavior.
""",
]
index = ["filebeat-*"]
language = "kuery"
license = "Elastic License"
name = "GCP Firewall Rule Creation"
note = "The GCP Filebeat module must be enabled to use this rule."
references = ["https://cloud.google.com/vpc/docs/firewalls"]
risk_score = 21
rule_id = "30562697-9859-4ae0-a8c5-dab45d664170"
severity = "low"
tags = ["Elastic", "GCP", "Continuous Monitoring", "SecOps", "Configuration Audit"]
type = "query"
query = '''
event.module:googlecloud and event.dataset:googlecloud.audit and event.action:v*.compute.firewalls.insert
'''
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1562"
name = "Impair Defenses"
reference = "https://attack.mitre.org/techniques/T1562/"
[rule.threat.tactic]
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"