diff --git a/docs/detections/detection-engine-intro.asciidoc b/docs/detections/detection-engine-intro.asciidoc index 45a9174607..319ac506b8 100644 --- a/docs/detections/detection-engine-intro.asciidoc +++ b/docs/detections/detection-engine-intro.asciidoc @@ -26,7 +26,7 @@ modifying your own rules. There are two special prebuilt rules you need to know about: -* <>: +* <>: Automatically creates an alert from all incoming Elastic Endpoint alerts. To receive Elastic Endpoint alerts, you must install the Endpoint agent on your hosts (see <>). diff --git a/docs/detections/prebuilt-rules/prebuilt-rules-changelog.asciidoc b/docs/detections/prebuilt-rules/prebuilt-rules-changelog.asciidoc index e70651c685..d1988928be 100644 --- a/docs/detections/prebuilt-rules/prebuilt-rules-changelog.asciidoc +++ b/docs/detections/prebuilt-rules/prebuilt-rules-changelog.asciidoc @@ -7,6 +7,105 @@ The following lists prebuilt rule updates per release. Only rules with significant modifications to their query or scope are listed. For detailed information about a rule's changes, see the rule's description page. +[float] +=== 7.10.0 + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + +<> + [float] === 7.9.0 @@ -100,9 +199,7 @@ information about a rule's changes, see the rule's description page. <> -<> - -<> +<> <> @@ -219,19 +316,19 @@ These prebuilt rules have been updated: <> -<> +<> <> <> -<> +<> -<> +<> -<> +<> -<> +<> <> @@ -245,9 +342,9 @@ These prebuilt rules have been updated: <> -<> +<> -<> +<> <> @@ -259,9 +356,9 @@ These prebuilt rules have been updated: <> -<> +<> -<> +<> <> @@ -271,9 +368,7 @@ These prebuilt rules have been updated: <> -<> - -<> +<> <> @@ -283,9 +378,9 @@ These prebuilt rules have been updated: <> -<> +<> -<> +<> <> @@ -293,9 +388,9 @@ These prebuilt rules have been updated: <> -<> +<> -<> +<> <> @@ -309,9 +404,9 @@ These prebuilt rules have been updated: <> -<> +<> -<> +<> <> diff --git a/docs/detections/prebuilt-rules/prebuilt-rules-reference.asciidoc b/docs/detections/prebuilt-rules/prebuilt-rules-reference.asciidoc index 67345ec9c1..128be54ab8 100644 --- a/docs/detections/prebuilt-rules/prebuilt-rules-reference.asciidoc +++ b/docs/detections/prebuilt-rules/prebuilt-rules-reference.asciidoc @@ -16,410 +16,636 @@ and their rule type is `machine_learning`. |Rule |Description |Tags |Added |Version -|<> |An adversary may attempt to access the secrets in AWS Secrets Manager to steal certificates, credentials, or other sensitive material. |[AWS] [Elastic] [SecOps] [Data Protection] [Continuous Monitoring] |7.9.0 |1 +|<> |An adversary may attempt to access the secrets in AWS Secrets Manager to steal certificates, credentials, or other sensitive material. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Data Protection] |7.9.0 |2 <> -|<> |Identifies the creation of an AWS log trail that specifies the settings for delivery of log data. |[AWS] [Elastic] [SecOps] [Logging] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the creation of an AWS log trail that specifies the settings for delivery of log data. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Log Auditing] |7.9.0 |2 <> -|<> |Identifies the deletion of an AWS log trail. An adversary may delete trails in an attempt to evade defenses. |[AWS] [Elastic] [SecOps] [Logging] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of an AWS log trail. An adversary may delete trails in an attempt to evade defenses. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Log Auditing] |7.9.0 |2 <> -|<> |Identifies suspending the recording of AWS API calls and log file delivery for the specified trail. An adversary may suspend trails in an attempt to evade defenses. |[AWS] [Elastic] [SecOps] [Logging] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies suspending the recording of AWS API calls and log file delivery for the specified trail. An adversary may suspend trails in an attempt to evade defenses. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Log Auditing] |7.9.0 |2 <> -|<> |Identifies an update to an AWS log trail setting that specifies the delivery of log files. |[AWS] [Elastic] [SecOps] [Logging] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies an update to an AWS log trail setting that specifies the delivery of log files. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Log Auditing] |7.9.0 |2 <> -|<> |Identifies the deletion of an AWS CloudWatch alarm. An adversary may delete alarms in an attempt to evade defenses. |[AWS] [Elastic] [SecOps] [Monitoring] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of an AWS CloudWatch alarm. An adversary may delete alarms in an attempt to evade defenses. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Monitoring] |7.9.0 |2 <> -|<> |Identifies the deletion of a specific AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted. |[AWS] [Elastic] [SecOps] [Logging] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of a specific AWS CloudWatch log group. When a log group is deleted, all the archived log events associated with the log group are also permanently deleted. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Log Auditing] |7.9.0 |2 <> -|<> |Identifies the deletion of an AWS CloudWatch log stream, which permanently deletes all associated archived log events with the stream. |[AWS] [Elastic] [SecOps] [Logging] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of an AWS CloudWatch log stream, which permanently deletes all associated archived log events with the stream. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Log Auditing] |7.9.0 |2 <> -|<> |Identifies attempts to delete an AWS Config Service rule. An adversary may tamper with Config rules in order to reduce visibility into the security posture of an account and/or its workload instances. |[AWS] [Elastic] [SecOps] [Monitoring] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies attempts to delete an AWS Config Service rule. An adversary may tamper with Config rules in order to reduce visibility into the security posture of an account and/or its workload instances. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Monitoring] |7.9.0 |2 <> -|<> |Identifies an AWS configuration change to stop recording a designated set of resources. |[AWS] [Elastic] [SecOps] [Monitoring] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies an AWS configuration change to stop recording a designated set of resources. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Monitoring] |7.9.0 |2 <> -|<> |Identifies disabling of default Amazon Elastic Block Store (EBS) encryption in the current region. Disabling default encryption does not change the encryption status of your existing volumes. |[AWS] [Elastic] [SecOps] [Data Protection] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies disabling of default Amazon Elastic Block Store (EBS) encryption in the current region. Disabling default encryption does not change the encryption status of your existing volumes. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Data Protection] |7.9.0 |2 <> -|<> |Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses. |[AWS] [Elastic] [SecOps] [Logging] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of one or more flow logs in AWS Elastic Compute Cloud (EC2). An adversary may delete flow logs in an attempt to evade defenses. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Log Auditing] |7.9.0 |2 <> -|<> |Identifies the creation of an AWS Elastic Compute Cloud (EC2) network access control list (ACL) or an entry in a network ACL with a specified rule number. |[AWS] [Elastic] [SecOps] [Network] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the creation of an AWS Elastic Compute Cloud (EC2) network access control list (ACL) or an entry in a network ACL with a specified rule number. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Network Security] |7.9.0 |2 <> -|<> |Identifies the deletion of an Amazon Elastic Compute Cloud (EC2) network access control list (ACL) or one of its ingress/egress entries. |[AWS] [Elastic] [SecOps] [Network] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of an Amazon Elastic Compute Cloud (EC2) network access control list (ACL) or one of its ingress/egress entries. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Network Security] |7.9.0 |2 <> -|<> |An attempt was made to modify AWS EC2 snapshot attributes. Snapshots are sometimes shared by threat actors in order to exfiltrate bulk data from an EC2 fleet. If the permissions were modified, verify the snapshot was not shared with an unauthorized or unexpected AWS account. |[AWS] [Elastic] [SecOps] [Asset Visibility] [Continuous Monitoring] |7.9.0 |1 +|<> |An attempt was made to modify AWS EC2 snapshot attributes. Snapshots are sometimes shared by threat actors in order to exfiltrate bulk data from an EC2 fleet. If the permissions were modified, verify the snapshot was not shared with an unauthorized or unexpected AWS account. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Asset Visibility] |7.9.0 |2 <> -|<> |Identifies the execution of commands and scripts via System Manager. Execution methods such as RunShellScript, RunPowerShellScript, and alike can be abused by an authenticated attacker to install a backdoor or to interact with a compromised instance via reverse-shell using system only commands. |[AWS] [Elastic] [SecOps] [Logging] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the execution of commands and scripts via System Manager. Execution methods such as RunShellScript, RunPowerShellScript, and alike can be abused by an authenticated attacker to install a backdoor or to interact with a compromised instance via reverse-shell using system only commands. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Log Auditing] |7.9.0 |2 <> -|<> |Identifies the deletion of an Amazon GuardDuty detector. Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost. |[AWS] [Elastic] [SecOps] [Monitoring] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of an Amazon GuardDuty detector. Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Monitoring] |7.9.0 |2 <> -|<> |Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role. |[AWS] [Elastic] [SecOps] [Identity and Access] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies attempts to modify an AWS IAM Assume Role Policy. An adversary may attempt to modify the AssumeRolePolicy of a misconfigured role in order to gain the privileges of that role. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Identity and Access] |7.9.0 |2 <> -|<> |Identifies a high number of failed attempts to assume an AWS Identity and Access Management (IAM) role. IAM roles are used to delegate access to users or services. An adversary may attempt to enumerate IAM roles in order to determine if a role exists before attempting to assume or hijack the discovered role. |[AWS] [Elastic] [SecOps] [Identity and Access] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies a high number of failed attempts to assume an AWS Identity and Access Management (IAM) role. IAM roles are used to delegate access to users or services. An adversary may attempt to enumerate IAM roles in order to determine if a role exists before attempting to assume or hijack the discovered role. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Identity and Access] |7.9.0 |2 <> -|<> |Identifies the deactivation of a specific multi-factor authentication (MFA) device and removes its association with the user name for which it was originally enabled. In AWS Identity and Access Management (IAM), a device must be deactivated before it can be deleted. |[AWS] [Elastic] [SecOps] [Monitoring] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deactivation of a specific multi-factor authentication (MFA) device and removes its association with the user name for which it was originally enabled. In AWS Identity and Access Management (IAM), a device must be deactivated before it can be deleted. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Monitoring] |7.9.0 |2 <> -|<> |Identifies the creation of a group in AWS Identity and Access Management (IAM). Groups specify permissions for multiple users. All users in a group automatically have the permissions that are assigned to the group. |[AWS] [Elastic] [SecOps] [Identity and Access] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the creation of a group in AWS Identity and Access Management (IAM). Groups specify permissions for multiple users. All users in a group automatically have the permissions that are assigned to the group. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Identity and Access] |7.9.0 |2 <> -|<> |Identifies the deletion of a specific AWS Identity and Access Management (IAM) resource group. Deleting a resource group does not delete resources that are members of the group, only the group structure. |[AWS] [Elastic] [SecOps] [Monitoring] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of a specific AWS Identity and Access Management (IAM) resource group. Deleting a resource group does not delete resources that are members of the group, only the group structure. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Monitoring] |7.9.0 |2 <> -|<> |Identifies AWS IAM password recovery requests. An adversary may attempt to gain unauthorized AWS access by abusing password recovery mechanisms. |[AWS] [Elastic] [SecOps] [Identity and Access] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies AWS IAM password recovery requests. An adversary may attempt to gain unauthorized AWS access by abusing password recovery mechanisms. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Identity and Access] |7.9.0 |2 <> -|<> |Identifies the addition of a user to a specific group in AWS Identity and Access Management (IAM). |[AWS] [Elastic] [SecOps] [Identity and Access] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the addition of a user to a specific group in AWS Identity and Access Management (IAM). |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Identity and Access] |7.9.0 |2 <> -|<> |Identifies a successful login to the AWS Management Console by the Root user. |[AWS] [Elastic] [SecOps] [Identity and Access] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies a high number of failed authentication attempts to the AWS management console for the Root user identity. An adversary may attempt to brute force the password for the Root user identity, as it has complete access to all services and resources for the AWS account. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Identity and Access] |7.10.0 |1 -|<> |Identifies the creation of a new Amazon Relational Database Service (RDS) Aurora DB cluster or global database spread across multiple regions. |[AWS] [Elastic] [SecOps] [Asset Visibility] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies a successful login to the AWS Management Console by the Root user. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Identity and Access] |7.9.0 |2 <> -|<> |Identifies the deletion of an Amazon Relational Database Service (RDS) Aurora database cluster or global database cluster. |[AWS] [Elastic] [SecOps] [Asset Visibility] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the creation of a new Amazon Relational Database Service (RDS) Aurora DB cluster or global database spread across multiple regions. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Asset Visibility] |7.9.0 |2 <> -|<> |Identifies that an Amazon Relational Database Service (RDS) cluster or instance has been stopped. |[AWS] [Elastic] [SecOps] [Asset Visibility] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of an Amazon Relational Database Service (RDS) Aurora database cluster or global database cluster. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Asset Visibility] |7.9.0 |2 <> -|<> |Identifies attempts to login to AWS as the root user without using multi-factor authentication (MFA). Amazon AWS best practices indicate that the root user should be protected by MFA. |[AWS] [Elastic] [SecOps] [Identity and Access] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies that an Amazon Relational Database Service (RDS) cluster or instance has been stopped. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Asset Visibility] |7.9.0 |2 <> -|<> |Identifies the deletion of various Amazon Simple Storage Service (S3) bucket configuration components. |[AWS] [Elastic] [SecOps] [Asset Visibility] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies attempts to login to AWS as the root user without using multi-factor authentication (MFA). Amazon AWS best practices indicate that the root user should be protected by MFA. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Identity and Access] |7.9.0 |2 <> -|<> |Identifies the deletion of a specified AWS Web Application Firewall (WAF) access control list. |[AWS] [Elastic] [SecOps] [Network] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of various Amazon Simple Storage Service (S3) bucket configuration components. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Asset Visibility] |7.9.0 |2 <> -|<> |Identifies the deletion of a specific AWS Web Application Firewall (WAF) rule or rule group. |[AWS] [Elastic] [SecOps] [Network] [Continuous Monitoring] |7.9.0 |1 +|<> |Identifies the deletion of a specified AWS Web Application Firewall (WAF) access control list. |[Elastic] [Cloud] [AWS] [Continuous Monitoring] [SecOps] [Network Security] |7.9.0 |2 <> -|<