-
Notifications
You must be signed in to change notification settings - Fork 613
Deprecation Notice to Cloud Defend Rules #4520
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Rule: Deprecation - GuidelinesThese guidelines serve as a reminder set of considerations when recommending the deprecation of a rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
Aegrah
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are we still looking to migrate these over to Elastic Defend prior to deprecation? For the vast majority of these, we can write similar rules using the process.entry_leader.entry_meta.type == "container" to determine whether the process' init stems from a container.
I am fine doing this before I leave for PTO. WDYT? @imays11
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating Container Workload Protection | ||
| ### Investigating Deprecated - Container Workload Protection |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - Container Workload Protection | |
| ### Investigating Container Workload Protection |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All of the rule name changes in Investigation Guide is because of the Unit test failure reported here - https://github.com/elastic/detection-rules/actions/runs/13694627124/job/38294173310
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Strange one
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating AWS Credentials Searched For Inside A Container | ||
| ### Investigating Deprecated - AWS Credentials Searched For Inside A Container |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - AWS Credentials Searched For Inside A Container | |
| ### Investigating AWS Credentials Searched For Inside A Container |
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating Sensitive Files Compression Inside A Container | ||
| ### Investigating Deprecated - Sensitive Files Compression Inside A Container |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - Sensitive Files Compression Inside A Container | |
| ### Investigating Sensitive Files Compression Inside A Container |
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating Sensitive Keys Or Passwords Searched For Inside A Container | ||
| ### Investigating Deprecated - Sensitive Keys Or Passwords Searched For Inside A Container |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - Sensitive Keys Or Passwords Searched For Inside A Container | |
| ### Investigating Sensitive Keys Or Passwords Searched For Inside A Container |
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating Modification of Dynamic Linker Preload Shared Object Inside A Container | ||
| ### Investigating Deprecated - Modification of Dynamic Linker Preload Shared Object Inside A Container |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - Modification of Dynamic Linker Preload Shared Object Inside A Container | |
| ### Investigating Modification of Dynamic Linker Preload Shared Object Inside A Container |
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating SSH Authorized Keys File Modified Inside a Container | ||
| ### Investigating Deprecated - SSH Authorized Keys File Modified Inside a Container |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - SSH Authorized Keys File Modified Inside a Container | |
| ### Investigating SSH Authorized Keys File Modified Inside a Container |
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating File System Debugger Launched Inside a Privileged Container | ||
| ### Investigating Deprecated - File System Debugger Launched Inside a Privileged Container |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - File System Debugger Launched Inside a Privileged Container | |
| ### Investigating File System Debugger Launched Inside a Privileged Container |
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating Mount Launched Inside a Privileged Container | ||
| ### Investigating Deprecated - Mount Launched Inside a Privileged Container |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - Mount Launched Inside a Privileged Container | |
| ### Investigating Mount Launched Inside a Privileged Container |
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating Potential Container Escape via Modified notify_on_release File | ||
| ### Investigating Deprecated - Potential Container Escape via Modified notify_on_release File |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - Potential Container Escape via Modified notify_on_release File | |
| ### Investigating Potential Container Escape via Modified notify_on_release File |
| > This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs. | ||
| ### Investigating Potential Container Escape via Modified release_agent File | ||
| ### Investigating Deprecated - Potential Container Escape via Modified release_agent File |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Investigating Deprecated - Potential Container Escape via Modified release_agent File | |
| ### Investigating Potential Container Escape via Modified release_agent File |
|
We should also provide a reason for the deprecation, either in the setup guide or in the rule description, so it is clear to customers why this is being deprecated. Here is an example we did for the threat match rules. |
|
If you search for cloud_defend in our repo, it shows up in a couple places. We may need to make other minor changes. |
Updates |
|
@shashank-elastic I've added a setup guide with the additional deprecation context as suggested @w0rk3r @Aegrah for any duplicated rules you create can you be sure to add the tag "Domain: Container" as this is what I'm directing users to look for within the Linux ruleset as a replacement for these rules. |
Thanks for doing this @imays11. Just missed this, but we may have wanted to include in the note that they are already deprecated on severless. |
Pull Request
Issue link(s): https://github.com/elastic/security-team/issues/11393
Summary - What I changed
How To Test
Checklist
bug,enhancement,schema,maintenance,Rule: New,Rule: Deprecation,Rule: Tuning,Hunt: New, orHunt: Tuningso guidelines can be generatedmeta:rapid-mergelabel if planning to merge within 24 hoursContributor checklist