-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Detection for Multi Cloud #8808
Conversation
The detection is centered around Azure and AWS cloud environments, with a primary focus on identifying activities related to IAAS resource abuse within both AWS and Azure cloud environments.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fix KQL error
@petebryan , Added Cross Cloud detection, kindly review. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hello how are you I am GitHub bot |
Hello how are you I am GitHub bot |
Hello how are you I am GitHub bot |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Error Fix
Detections/MultipleDataSources/BrutforceAttemptOnAzurePortalAndAWSConsolAtSameTime.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/BrutforceAttemptOnAzurePortalAndAWSConsolAtSameTime.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/BrutforceAttemptOnAzurePortalAndAWSConsolAtSameTime.yaml
Show resolved
Hide resolved
Detections/MultipleDataSources/BrutforceAttemptOnAzurePortalAndAWSConsolAtSameTime.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/ExtensiveAWSComputeResurseDeployements.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/SuspiciousAWSCLICommandExecution.yaml
Outdated
Show resolved
Hide resolved
Hello how are you I am GitHub bot |
Update : -customDetails - enabled Logic for both platform (AWS or Azure)
Hello how are you I am GitHub bot |
…iciousAWSEC2ComputeResourceDeployments Update- -Changed Title -added customDetails -slight change in detection logic
Hello how are you I am GitHub bot |
… to SuccessfulAWSConsoleLoginfromIPAddressObservedConductingPasswordSpray.yaml -Name and Title Changed -Timing logic changed
Hello how are you I am GitHub bot |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
PR Error Fix
@petebryan, I have updated 2 more detections for AWSGurdduty to the Azure portal login, kindly review. |
Detections/MultipleDataSources/BrutforceAttemptOnAzurePortalAndAWSConsolAtSameTime.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/CrossCloudUnauthorizedCredentialsAccessDetection.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/CrossCloudUnauthorizedCredentialsAccessDetection.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/SuspiciousAWSCLICommandExecution.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/SuspiciousAWSEC2ComputeResourceDeployments.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/Unauthorized_user_access_across_AWS_and_Azure.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/Unauthorized_user_access_across_AWS_and_Azure.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/CrossCloudUnauthorizedCredentialsAccessDetection.yaml
Outdated
Show resolved
Hide resolved
Accepted suggested logic | where (AWSFailedEventsCount >= 4 and AzureFailedEventsCount >= 5) and ((AzureSuccessfuleventsCount >= 1 and AzureFailedEvent > AzureSuccessfulEvent) or (AWSSuccessfuleventsCount >= 1 and AWSFailedEventsCount > AWSSuccessfuleventsCount))
Hello how are you I am GitHub bot |
Updated AWS Title
Hello how are you I am GitHub bot |
Hello how are you I am GitHub bot |
Added New Detection for AWS cloud Shell execution
Hello how are you I am GitHub bot |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated all the changes
…Deployments.yaml File moved
Hello how are you I am GitHub bot |
…n.yaml file moved
Hello how are you I am GitHub bot |
Detections/MultipleDataSources/CrossCloudUnauthorizedCredentialsAccessDetection.yaml
Outdated
Show resolved
Hide resolved
Detections/MultipleDataSources/Unauthorized_user_access_across_AWS_and_Azure.yaml
Outdated
Show resolved
Hide resolved
Line removed
Hello how are you I am GitHub bot |
Hello how are you I am GitHub bot |
up[dated alertDescriptionFormat
Hello how are you I am GitHub bot |
Hello how are you I am GitHub bot |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Update files based on suggestions.
The detection is centered around Azure and AWS cloud environments, with a primary focus on identifying activities related to IAAS resource abuse within both AWS and Azure cloud environments.
Required items, please complete
Change(s):
New Detection
Reason for Change(s):
Multi-cloud Detection creation
Version Updated:
-yes
Testing Completed:
-yes