Fix remaining Replace master doc URLs with current (#4441)

This commit is contained in:
shashank-elastic
2025-02-03 23:03:20 +05:30
committed by GitHub
parent 818467f132
commit a866ee7f57
2 changed files with 4 additions and 4 deletions
@@ -2,7 +2,7 @@
creation_date = "2024/04/14"
integration = ["aws"]
maturity = "production"
updated_date = "2025/01/27"
updated_date = "2025/02/03"
[rule]
author = ["Elastic"]
@@ -10,7 +10,7 @@ description = """
Identifies discovery request `DescribeInstanceAttribute` with the attribute userData and instanceId in AWS CloudTrail
logs. This may indicate an attempt to retrieve user data from an EC2 instance. Adversaries may use this information to
gather sensitive data from the instance such as hardcoded credentials or to identify potential vulnerabilities. This is
a [New Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule that
a [New Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule that
identifies when `aws.cloudtrail.user_identity.arn` requests the user data for a specific
`aws.cloudtrail.flattened.request_parameters.instanceId` from an EC2 instance in the last 14 days.
"""
@@ -2,7 +2,7 @@
creation_date = "2021/06/05"
integration = ["aws"]
maturity = "production"
updated_date = "2025/01/27"
updated_date = "2025/02/03"
[rule]
author = ["Elastic", "Austin Songer"]
@@ -10,7 +10,7 @@ description = """
Identifies AWS CloudTrail events where an EC2 route table or association has been modified or deleted. Route table or
association modifications can be used by attackers to disrupt network traffic, reroute communications, or maintain
persistence in a compromised environment. This is a [New
Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule that detects the
Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule that detects the
first instance of this behavior by the `aws.cloudtrail.user_identity.arn` field in the last 10 days.
"""
false_positives = [