fcc82fa49c
* [Rule Tuning] AWS S3 Unauthenticated Bucket Access by Rare Source No query changes as this rule is alerting as expected, however I did change the new terms field to be a combination of an IP address and a particular bucket name. Rather than just alerting for the IP address itself. Perhaps an IP is seen retrieving a doc from a public bucket in the environment (expected behavior) but then it also accesses a file in a bucket meant to be private (unexpected behavior). With new terms only on the IP address we would miss the private bucket access. - added `tls.client.server_name` to new terms field (bucket name) - reduced execution window - removed duplicate IG - added setup note for turning on data events - small edits to description and highlighted fields * Update collection_s3_unauthenticated_bucket_access_by_rare_source.toml * Update collection_s3_unauthenticated_bucket_access_by_rare_source.toml * Update collection_s3_unauthenticated_bucket_access_by_rare_source.toml * Update collection_s3_unauthenticated_bucket_access_by_rare_source.toml