Files
sigma-rules/rules/integrations
Isai 76e083ced0 [Rule Tunings] AWS Route Table Created / AWS EC2 Route Table Modified or Deleted (#5064)
* [Rule Tunings] AWS Route Table Created / AWS EC2 Route Table Modified or Deleted

AWS Route Table Created
- turned this into a new_terms rule to reduce noise and be more indicative of potential malicious behavior. Used `cloud.account.id`, `user.name` combination to account for both roles and users doing this behavior for the first time.
- changed execution interval
- changed the name to add EC2
- slight adjustments to IG and description
- fixed tagging error
- added investigation fields

AWS EC2 Route Table Modified or Deleted
- replaced new terms field to `cloud.account.id`, `user.name` combination to account for both roles and users doing this behavior for the first time.
- removed the exclusions from this rule. These exclusions, while meant to reduce noise caused by automation tools, actually just provide an easy bypass. A user can simply use CloudFormation to perform the exact same behaviors and avoid detection. I've shown this in the screenshot below, I ran a nearly identical script, one with and one without using CloudFormation. While `source.address` is `cloudformation.amazonaws.com` the behavior was still performed by an IAMUser and should still be evaluated. The fact that this is a new terms rule will reduce the risk of noise due to automation using these tools.
- changed execution interval
- slight adjustments to IG and description
- added investigation fields

* Update persistence_route_table_created.toml

* Update rules/integrations/aws/persistence_ec2_route_table_modified_or_deleted.toml
2025-09-11 15:35:16 -04:00
..
2025-07-07 11:27:48 -04:00
2025-03-20 20:32:07 +05:30
2025-09-10 23:24:28 +05:30
2025-07-07 11:27:48 -04:00