-
Notifications
You must be signed in to change notification settings - Fork 513
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[New Rule] Adding Coverage for AWS S3 Unauthenticated Bucket Listing by Rare Source
#4313
base: main
Are you sure you want to change the base?
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
AWS S3 Unauthenticated Bucket Listing by Rare Source
|
||
[rule.threat.tactic] | ||
id = "TA0009" | ||
name = "Collection" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this looks more of a discovery ctivity vs collection, https://attack.mitre.org/techniques/T1619/
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
++
S3 bucket without authentication. This is a [New | ||
Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule, which means it | ||
will only trigger once for each unique value of the `source.address` field that has not been seen making this API | ||
request within the last 7 days. This field contains the IP address of the source making the request. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
S3 bucket without authentication. This is a [New | |
Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule, which means it | |
will only trigger once for each unique value of the `source.address` field that has not been seen making this API | |
request within the last 7 days. This field contains the IP address of the source making the request. | |
S3 bucket without authentication. This is a New Terms | |
(https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule, which means it will | |
only trigger once for each unique value of the `source.address` field that has not been seen making this API request | |
within the last 7 days. This field contains the IP address of the source making the request. |
Descriptions aren't rendered
|
||
[rule.threat.tactic] | ||
id = "TA0009" | ||
name = "Collection" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
++
Pull Request
Issue link(s):
Summary - What I changed
Adding coverage for unauthenticated or "anonymous" bucket listing by rare source.
This rule detects attempts to list objects in an AWS S3 bucket from an unauthenticated source. This activity may indicate a misconfigured S3 bucket policy that allows unauthorized public access. Adversaries can exploit this misconfiguration to gather information about the bucket contents using tools or scripts.
The rule triggers when a rare IP address, not seen in the past 7 days, attempts to list S3 bucket objects without authentication.
How To Test
Checklist
bug
,enhancement
,schema
,maintenance
,Rule: New
,Rule: Deprecation
,Rule: Tuning
,Hunt: New
, orHunt: Tuning
so guidelines can be generatedmeta:rapid-merge
label if planning to merge within 24 hoursContributor checklist