b73e6e2a57
* [Rule Tuning] AWS S3 Bucket Enumeration or Brute Force - changed to threshold rule to improve context - groups alerts by unique combination of `tls.client.server_name`(bucket name), `source.address` (can be either an ip or an internal AWS service address like ), and `aws.cloudtrail.user_identity.type` (this is to prevent capturing double events produced when a user Assumes a role inside another AWS account. This results in the same request being created twice, once as both AssumedRole and AWSAccount identity types) - uses `event.id` as the cardinality field and counts >= 40 - checks that`tls.client.server_name` exists in the query, this is to prevent capturing denied internal AWS actions that may occur against no particular bucket but against the S3 service itself - adds highlighted fields - replaces mitre technique - replaces more detailed investigation guide including specific details around investigating Threshold rule types via timeline * kuery language update * removing extra space * adding integration * removing filebeat because of tls.client.server_name removing filebeat because of tls.client.server_name * update IG references updated the references listed in the IG --------- Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>