4e4559204d
* [Rule Tunings] AWS removal of target.entity.id and actor.entity.id fields Related Issue : - https://github.com/elastic/security-team/issues/14019 `target.entity.id` and `related.entity.id` fields will soon be fully removed from the AWS Integration. This rule tuning replaces rule queries that relied on `target.entity.id` with the equivalent field `entity.target.id` which was introduced with AWS version 4.7.0 along with several new entity classification fields. This tuning also removes references to these fields in highlighted fields and investigation guides for several rules. * update data for defense_evasion_route53_dns_query_resolver_config_deletion.toml update data for defense_evasion_route53_dns_query_resolver_config_deletion.toml * updated_dates * [Rule Tunings] AWS remove target.entity.id and actor.entity.id fields adding min_stack to rules using the field `entity.target.id`, we determined AWS version 4.7.0 is compatible with Kibana versions '^8.19.4 || ^9.1.4'. We reverted the initial PR and this one adds the min_stack_version. Original PR: - https://github.com/elastic/detection-rules/pull/5563 ______ ### Issue Link - https://github.com/elastic/ia-trade-team/issues/781 ## Summary - What I changed `target.entity.id` and `actor.entity.id` fields will soon be fully removed from the AWS Integration. This rule tuning replaces rule queries that relied on `target.entity.id` with the equivalent field `entity.target.id` which was introduced with AWS version 4.7.0 along with several new entity classification fields. This tuning also removes references to these fields in highlighted fields and investigation guides for several rules. <img width="1622" height="1488" alt="image" src="https://github.com/user-attachments/assets/024fbdb2-c0e4-4785-9735-5285218e4fa9" /> ## Rules with Query Changes **AWS IAM Customer-Managed Policy Attached to Role by Rare User AWS IAM Assume Role Policy Update** Both of these rules relied on `target.entity.id` as a new terms field, this field has been replaced with `entity.target.id` field which is populating the same value for the event.actions these rules trigger on, as shown in the screenshot below. <img width="1600" height="445" alt="Screenshot 2026-01-15 at 12 13 17 PM" src="https://github.com/user-attachments/assets/27e482fe-2a09-4dfb-8337-2e5070422183" /> ## How To Test - recent test data is in our stack for the 2 rules that have changes to their new terms values. - test scripts for each: - [trigger_privilege_escalation_iam_customer_managed_policy_attached_to_role.py](https://github.com/elastic/elastic-aws-ruleset-testing/blob/main/IAM/trigger_privilege_escalation_iam_customer_managed_policy_attached_to_role.py) - [trigger_privilege_escalation_update_assume_role_policy.py](https://github.com/elastic/elastic-aws-ruleset-testing/blob/main/IAM/trigger_privilege_escalation_update_assume_role_policy.py)