Skip to content

Commit

Permalink
Add new rule to detect changes to TPM Keys on Windows
Browse files Browse the repository at this point in the history
  • Loading branch information
gfs committed Apr 22, 2020
1 parent 106685c commit 8b0ce20
Show file tree
Hide file tree
Showing 5 changed files with 37 additions and 52 deletions.
17 changes: 17 additions & 0 deletions .github/ISSUE_TEMPLATE/rule.md
@@ -0,0 +1,17 @@
---
name: Filter Request or Submission
about: Request a filter be added to the default ruleset
title:
labels: filters
assignees: ''

---
**What does this rule detect?**

**Why should this rule be added?**

**Does this require the addition of a new [operation](https://microsoft.github.io/AttackSurfaceAnalyzer/api/AttackSurfaceAnalyzer.Types.OPERATION.html) to the parser?**

If so, this should be filed as an feature request.

**Rule Json (optional)**
1 change: 1 addition & 0 deletions Pipelines/pr-validation.yml
Expand Up @@ -16,6 +16,7 @@ pr:
- Tests
- Benchmarks
- Pipelines
- analyses.json

variables:
solution: '**/*.sln'
Expand Down
1 change: 1 addition & 0 deletions Pipelines/release.yml
Expand Up @@ -8,6 +8,7 @@ trigger:
- Cli
- Lib
- Pipelines
- analyses.json
branches:
include:
- release/v2.*
Expand Down
18 changes: 18 additions & 0 deletions analyses.json
Expand Up @@ -840,6 +840,24 @@
"Operation": "IS_EXPIRED"
}
]
},
{
"Name": "TPM Keys",
"Description": "These TPM Keys have been changed.",
"Flag": "WARNING",
"ResultType": "FILE",
"Platforms": [
"WINDOWS"
],
"Clauses": [
{
"Field": "Path",
"Operation": "ENDS_WITH",
"Data": [
".PCPKEY"
]
}
]
}
],
"DefaultLevels": {
Expand Down
52 changes: 0 additions & 52 deletions filters.json

This file was deleted.

0 comments on commit 8b0ce20

Please sign in to comment.