SigmaHQ/rules/cloud/aws_guardduty_disruption.yml
2020-09-13 22:03:04 -06:00

24 lines
763 B
YAML

title: AWS GuardDuty Important Change
id: 6e61ee20-ce00-4f8d-8aee-bedd8216f7e3
status: experimental
description: Detects updates of the GuardDuty list of trusted IPs, perhaps to disable security alerts against malicious IPs.
author: faloker
date: 2020/02/11
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/guardduty__whitelist_ip/main.py#L9
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: guardduty.amazonaws.com
selection_eventName:
- eventName: CreateIPSet
condition: all of them
falsepositives:
- Valid change in the GuardDuty (e.g. to ignore internal scanners)
level: high
tags:
- attack.defense_evasion
- attack.t1562.001
- attack.t1089 # an old one