You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
event.category:file and event.type:change and file.path:(/etc/sudoers* or /private/etc/sudoers*) and
36
-
not process.name:(dpkg or platform-python or puppet or yum or dnf) and
37
-
not process.executable:(/opt/chef/embedded/bin/ruby or /opt/puppetlabs/puppet/bin/ruby or /usr/bin/dockerd)
34
+
file where host.os.type in ("linux", "macos") and event.type in ("creation", "change") and
35
+
file.path like ("/etc/sudoers*", "/private/etc/sudoers*") and not (
36
+
process.name in ("dpkg", "platform-python", "puppet", "yum", "dnf") or
37
+
process.executable in ("/opt/chef/embedded/bin/ruby", "/opt/puppetlabs/puppet/bin/ruby", "/usr/bin/dockerd")
38
+
)
38
39
'''
39
40
note = """## Triage and analysis
40
41
@@ -71,30 +72,20 @@ The sudoers file is crucial in Unix-like systems, defining user permissions for
71
72
- Implement additional monitoring on the affected system and similar systems to detect any further attempts to modify the sudoers file or other privilege escalation activities.
72
73
- Review and update security policies and configurations to prevent similar incidents, ensuring that only authorized processes can modify the sudoers file."""
0 commit comments