76e083ced0
* [Rule Tunings] AWS Route Table Created / AWS EC2 Route Table Modified or Deleted AWS Route Table Created - turned this into a new_terms rule to reduce noise and be more indicative of potential malicious behavior. Used `cloud.account.id`, `user.name` combination to account for both roles and users doing this behavior for the first time. - changed execution interval - changed the name to add EC2 - slight adjustments to IG and description - fixed tagging error - added investigation fields AWS EC2 Route Table Modified or Deleted - replaced new terms field to `cloud.account.id`, `user.name` combination to account for both roles and users doing this behavior for the first time. - removed the exclusions from this rule. These exclusions, while meant to reduce noise caused by automation tools, actually just provide an easy bypass. A user can simply use CloudFormation to perform the exact same behaviors and avoid detection. I've shown this in the screenshot below, I ran a nearly identical script, one with and one without using CloudFormation. While `source.address` is `cloudformation.amazonaws.com` the behavior was still performed by an IAMUser and should still be evaluated. The fact that this is a new terms rule will reduce the risk of noise due to automation using these tools. - changed execution interval - slight adjustments to IG and description - added investigation fields * Update persistence_route_table_created.toml * Update rules/integrations/aws/persistence_ec2_route_table_modified_or_deleted.toml