c5dbd90662
* [Rule Tuningw] Add Console Session Filtering to AWS Temporary Credential Detection Rules Added `aws.cloudtrail.session_credential_from_console` field filtering to 2 rules to reduce false positives from legitimate console login sessions. Console logins automatically issue temporary "ASIA" credentials, which previously triggered alerts for rules monitoring session token abuse. - Updated false positives sections to reflect automatic console session filtering - Updated investigation guides to note that alerts indicate non-console temporary credential usage - min_stack_version = "9.2.0" because this field was introduced in AWS Integration version 4.6.0. 9.2.0 is the earliest major stack version supported. Impact - Significantly reduces false positives from legitimate AWS Management Console usage - Improves rule fidelity by focusing detection on programmatic abuse of temporary credentials (CLI, SDK, stolen credentials) * update boolean field value for aws.cloudtrail.session_credential_from_console update boolean field value for aws.cloudtrail.session_credential_from_console * removing filebeat compatibility removing filebeat compatibility