Skip to content

Commit 9434693

Browse files
committed
Fix broken links
1 parent 8de6bb2 commit 9434693

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

blog-cse/2024/12-31.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -852,7 +852,7 @@ Other changes are enumerated below.
852852

853853
This release reverts a change to our AWS CloudTrail default (catch all) mapper for how `user_username` is mapped. This is being reverted due to reports of breaking rule tuning and missing user context for some `AssumedRole` events.
854854

855-
AWS `AssumedRole` events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the [August 5th, 2024 content release](/release-notes-cse/2024/08/05/content/) to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.
855+
AWS `AssumedRole` events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the [August 5th, 2024 content release](/release-notes-cse/#august-5-2024---content-release) to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.
856856

857857
AWS best practices suggest defining `sourceIdentity` to allow for the originating user for a role assumption to be identifiable. This is the best path to avoid false positive generation, as our mapper will favor `sourceIdentity` if it is present in CloudTrail logs. If it is not present, then `userIdentity.arn` will be used and the `resource-id` will be mapped to `user_username`, creating potential for false positives from dynamic session identifiers. See [Viewing source identity in CloudTrail](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html#id_credentials_temp_control-access_monitor-ct) in the AWS documentation for more information.
858858

@@ -977,7 +977,7 @@ Individual changes are enumerated below.
977977
- The name or path of a centrally managed object storage location, such as a Git repository, a container repository, or similar concepts.
978978

979979
---
980-
### August 05, 2024 - Content Release
980+
### August 5, 2024 - Content Release
981981

982982
This content release includes:
983983
* A new Cloud SIEM First Seen rule

blog-csoar/2024/12-31.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -312,7 +312,7 @@ This release introduces three new integrations, as well as several updates.
312312
---
313313
### March 12, 2024 - Content Release
314314

315-
Our Cloud SOAR [application update](/release-notes-csoar/2024/03/12/application-update/) features an important upgrade to Python 3.12 for our Lambda functions. This enhancement is part of our ongoing commitment to security, performance, and the latest technological standards.
315+
Our Cloud SOAR [application update](/release-notes-csoar/#march-12-2024---application-update) features an important upgrade to Python 3.12 for our Lambda functions. This enhancement is part of our ongoing commitment to security, performance, and the latest technological standards.
316316

317317
The Python upgrade impacts a total of 38 integrations. These integrations will require updates to ensure compatibility with the new Python version.
318318

@@ -369,7 +369,7 @@ We strongly encourage all users to review the provided documentation and prepare
369369
### March 12, 2024 - Application Update
370370

371371
#### Changes and Enhancements
372-
* Python version updated. If you experience any issues, refer to our [content release note](/release-notes-csoar/2024/03/12/content/).
372+
* Python version updated. If you experience any issues, refer to our [content release note](/release-notes-csoar/#march-12-2024---content-release).
373373

374374
##### Cloud SOAR
375375
* Playbooks: Test feature now permits you to use internal Incident ID.

0 commit comments

Comments
 (0)