Skip to content

Commit 15d64d4

Browse files
Udpate names in investigation guide
1 parent c588b9f commit 15d64d4

18 files changed

+18
-18
lines changed

rules/integrations/cloud_defend/container_workload_protection.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ note = """## Triage and analysis
4242
> **Disclaimer**:
4343
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
4444
45-
### Investigating Container Workload Protection
45+
### Investigating Deprecated - Container Workload Protection
4646
4747
Container Workload Protection is crucial for securing containerized environments by monitoring and defending against threats. Adversaries may exploit vulnerabilities in container orchestration or escape isolation to access host systems. The detection rule leverages alerts from cloud defense modules, focusing on suspicious activities within container domains, enabling timely triage and investigation of potential security incidents.
4848

rules/integrations/cloud_defend/credential_access_aws_creds_search_inside_a_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ note = """## Triage and analysis
4545
> **Disclaimer**:
4646
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
4747
48-
### Investigating AWS Credentials Searched For Inside A Container
48+
### Investigating Deprecated - AWS Credentials Searched For Inside A Container
4949
5050
Containers often house applications that interact with AWS services, necessitating the storage of AWS credentials. Adversaries may exploit this by using search utilities to locate these credentials, potentially leading to unauthorized access. The detection rule identifies suspicious use of search tools within containers, flagging attempts to locate AWS credentials by monitoring specific process names and arguments, thus helping to prevent credential theft and subsequent attacks.
5151

rules/integrations/cloud_defend/credential_access_collection_sensitive_files_compression_inside_a_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ note = """## Triage and analysis
7070
> **Disclaimer**:
7171
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
7272
73-
### Investigating Sensitive Files Compression Inside A Container
73+
### Investigating Deprecated - Sensitive Files Compression Inside A Container
7474
7575
Containers are lightweight, portable environments used to run applications consistently across different systems. Adversaries may exploit compression utilities within containers to gather and exfiltrate sensitive files, such as credentials and configuration files. The detection rule identifies suspicious compression activities by monitoring for specific utilities and file paths, flagging potential unauthorized data collection attempts.
7676

rules/integrations/cloud_defend/credential_access_sensitive_keys_or_passwords_search_inside_a_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ note = """## Triage and analysis
5252
> **Disclaimer**:
5353
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5454
55-
### Investigating Sensitive Keys Or Passwords Searched For Inside A Container
55+
### Investigating Deprecated - Sensitive Keys Or Passwords Searched For Inside A Container
5656
5757
Containers encapsulate applications, providing isolated environments. Adversaries may exploit search utilities like grep or find to locate sensitive credentials within containers, potentially leading to unauthorized access or container escape. The detection rule identifies suspicious searches for private keys or passwords, flagging potential credential access attempts by monitoring process activities and arguments.
5858

rules/integrations/cloud_defend/defense_evasion_ld_preload_shared_object_modified_inside_a_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ note = """## Triage and analysis
3939
> **Disclaimer**:
4040
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
4141
42-
### Investigating Modification of Dynamic Linker Preload Shared Object Inside A Container
42+
### Investigating Deprecated - Modification of Dynamic Linker Preload Shared Object Inside A Container
4343
4444
The dynamic linker in Linux loads necessary libraries for programs at runtime, with the `ld.so.preload` file specifying libraries to load first. Adversaries exploit this by redirecting it to malicious libraries, gaining unauthorized access and evading detection. The detection rule identifies suspicious modifications to this file within containers, signaling potential hijacking attempts.
4545

rules/integrations/cloud_defend/discovery_suspicious_network_tool_launched_inside_a_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ note = """## Triage and analysis
5454
> **Disclaimer**:
5555
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5656
57-
### Investigating Suspicious Network Tool Launched Inside A Container
57+
### Investigating Deprecated - Suspicious Network Tool Launched Inside A Container
5858
5959
Containers are lightweight, portable units that encapsulate applications and their dependencies, often used to ensure consistent environments across development and production. Adversaries exploit network tools within containers for reconnaissance or lateral movement, leveraging utilities like `nc` or `nmap` to map networks or intercept traffic. The detection rule identifies these tools' execution by monitoring process starts and arguments, flagging potential misuse for further investigation.
6060

rules/integrations/cloud_defend/execution_container_management_binary_launched_inside_a_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ note = """## Triage and analysis
4848
> **Disclaimer**:
4949
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5050
51-
### Investigating Container Management Utility Run Inside A Container
51+
### Investigating Deprecated - Container Management Utility Run Inside A Container
5252
5353
Container management utilities like Docker and Kubernetes are essential for orchestrating and managing containerized applications. They facilitate tasks such as deployment, scaling, and networking. However, adversaries can exploit these tools to execute unauthorized commands within containers, potentially leading to system compromise. The detection rule identifies suspicious execution of these utilities within containers, signaling possible misuse or misconfiguration, by monitoring specific process activities and event types.
5454

rules/integrations/cloud_defend/execution_file_made_executable_via_chmod_inside_a_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ note = """## Triage and analysis
4444
> **Disclaimer**:
4545
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
4646
47-
### Investigating File Made Executable via Chmod Inside A Container
47+
### Investigating Deprecated - File Made Executable via Chmod Inside A Container
4848
4949
Containers provide isolated environments for running applications, often on Linux systems. The `chmod` command is used to change file permissions, including making files executable. Adversaries may exploit this by altering permissions to execute unauthorized scripts or binaries, potentially leading to malicious activity. The detection rule identifies such actions by monitoring for `chmod` usage that grants execute permissions, focusing on specific permission patterns, and excluding benign cases. This helps in identifying potential threats where attackers attempt to execute unauthorized code within containers.
5050

rules/integrations/cloud_defend/execution_interactive_exec_to_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ note = """## Triage and analysis
6464
> **Disclaimer**:
6565
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
6666
67-
### Investigating Interactive Exec Command Launched Against A Running Container
67+
### Investigating Deprecated - Interactive Exec Command Launched Against A Running Container
6868
6969
In containerized environments, the 'exec' command is used to run processes inside a running container, often for debugging or administrative tasks. Adversaries may exploit this to gain shell access, potentially leading to further compromise or container escape. The detection rule identifies such activities by monitoring for interactive 'exec' sessions, focusing on initial processes within containers, and flagging high-risk interactions.
7070

rules/integrations/cloud_defend/execution_interactive_shell_spawned_from_inside_a_container.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ note = """## Triage and analysis
5353
> **Disclaimer**:
5454
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5555
56-
### Investigating Suspicious Interactive Shell Spawned From Inside A Container
56+
### Investigating Deprecated - Suspicious Interactive Shell Spawned From Inside A Container
5757
5858
Containers are lightweight, portable units that encapsulate applications and their dependencies, often used to ensure consistent environments across development and production. Adversaries may exploit containers by spawning interactive shells to execute unauthorized commands, potentially leading to container escape and host compromise. The detection rule identifies such threats by monitoring for shell processes initiated within containers, focusing on specific process actions and arguments indicative of interactive sessions.
5959

0 commit comments

Comments
 (0)