Skip to content

Commit a0e3c10

Browse files
review comments
1 parent b40403c commit a0e3c10

6 files changed

+6
-6
lines changed

rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_by_single_user.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ and they can establish thresholds for harmful content categories, including hate
5858
- Identify the account role in the cloud environment.
5959
- Identify if the attacker is moving laterally and compromising other Amazon Bedrock Services.
6060
- Identify any regulatory or legal ramifications related to this activity.
61-
- Review the permissions assigned to the implicated user to ensure that the least privilege principle is being followed.
61+
- Review the permissions assigned to the implicated user group or role behind these requests to ensure they are authorized and expected to access bedrock and ensure that the least privilege principle is being followed.
6262
- Determine the initial vector abused by the attacker and take action to prevent reinfection via the same vector.
6363
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
6464
"""

rules/integrations/aws_bedrock/aws_bedrock_guardrails_multiple_violations_in_single_request.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ and they can establish thresholds for harmful content categories, including hate
5858
- Identify the account role in the cloud environment.
5959
- Identify if the attacker is moving laterally and compromising other Amazon Bedrock Services.
6060
- Identify any regulatory or legal ramifications related to this activity.
61-
- Review the permissions assigned to the implicated user to ensure that the least privilege principle is being followed.
61+
- Review the permissions assigned to the implicated user group or role behind these requests to ensure they are authorized and expected to access bedrock and ensure that the least privilege principle is being followed.
6262
- Determine the initial vector abused by the attacker and take action to prevent reinfection via the same vector.
6363
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
6464
"""

rules/integrations/aws_bedrock/aws_bedrock_high_confidence_misconduct_blocks_detected.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ and they can establish thresholds for harmful content categories, including hate
5656
- Identify the account role in the cloud environment.
5757
- Identify if the attacker is moving laterally and compromising other Amazon Bedrock Services.
5858
- Identify any regulatory or legal ramifications related to this activity.
59-
- Review the permissions assigned to the implicated user to ensure that the least privilege principle is being followed.
59+
- Review the permissions assigned to the implicated user group or role behind these requests to ensure they are authorized and expected to access bedrock and ensure that the least privilege principle is being followed.
6060
- Determine the initial vector abused by the attacker and take action to prevent reinfection via the same vector.
6161
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
6262
"""

rules/integrations/aws_bedrock/aws_bedrock_high_resource_consumption_detection.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Bedrock offers a variety of pretrained models from Amazon (such as the Titan ser
5555
- Identify if the attacker is moving laterally and compromising other Amazon Bedrock Services.
5656
- Identify any regulatory or legal ramifications related to this activity.
5757
- Identify potential resource exhaustion and impact on billing.
58-
- Review the permissions assigned to the implicated user to ensure that the least privilege principle is being followed.
58+
- Review the permissions assigned to the implicated user group or role behind these requests to ensure they are authorized and expected to access bedrock and ensure that the least privilege principle is being followed.
5959
- Determine the initial vector abused by the attacker and take action to prevent reinfection via the same vector.
6060
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
6161
"""

rules/integrations/aws_bedrock/aws_bedrock_multiple_attempts_to_use_denied_models_by_user.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Bedrock offers a variety of pretrained models from Amazon (such as the Titan ser
5454
- Identify the account role in the cloud environment.
5555
- Identify if the attacker is moving laterally and compromising other Amazon Bedrock Services.
5656
- Identify any regulatory or legal ramifications related to this activity.
57-
- Review the permissions assigned to the implicated user to ensure that the least privilege principle is being followed.
57+
- Review the permissions assigned to the implicated user group or role behind these requests to ensure they are authorized and expected to access bedrock and ensure that the least privilege principle is being followed.
5858
- Determine the initial vector abused by the attacker and take action to prevent reinfection via the same vector.
5959
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
6060
"""

rules/integrations/aws_bedrock/aws_bedrock_multiple_validation_exception_errors_by_single_user.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Bedrock offers a variety of pretrained models from Amazon (such as the Titan ser
5858
- Identify if the attacker is moving laterally and compromising other Amazon Bedrock Services.
5959
- Identify any regulatory or legal ramifications related to this activity.
6060
- Identify if any implication to resource billing.
61-
- Review the permissions assigned to the implicated user to ensure that the least privilege principle is being followed.
61+
- Review the permissions assigned to the implicated user group or role behind these requests to ensure they are authorized and expected to access bedrock and ensure that the least privilege principle is being followed.
6262
- Determine the initial vector abused by the attacker and take action to prevent reinfection via the same vector.
6363
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
6464
"""

0 commit comments

Comments
 (0)