Skip to content

Commit c588b9f

Browse files
Deprecation Notice to Cloud Defend Rules
1 parent 8854b3b commit c588b9f

18 files changed

+36
-36
lines changed

rules/integrations/cloud_defend/container_workload_protection.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/05"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,7 +16,7 @@ index = ["logs-cloud_defend.alerts-*"]
1616
language = "kuery"
1717
license = "Elastic License v2"
1818
max_signals = 10000
19-
name = "Container Workload Protection"
19+
name = "Deprecated - Container Workload Protection"
2020
risk_score = 47
2121
rule_id = "4b4e9c99-27ea-4621-95c8-82341bc6e512"
2222
rule_name_override = "message"

rules/integrations/cloud_defend/credential_access_aws_creds_search_inside_a_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/06/28"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,7 +16,7 @@ index = ["logs-cloud_defend*"]
1616
interval = "5m"
1717
language = "eql"
1818
license = "Elastic License v2"
19-
name = "AWS Credentials Searched For Inside A Container"
19+
name = "Deprecated - AWS Credentials Searched For Inside A Container"
2020
references = ["https://sysdig.com/blog/threat-detection-aws-cloud-containers/"]
2121
risk_score = 47
2222
rule_id = "d0b0f3ed-0b37-44bf-adee-e8cb7de92767"

rules/integrations/cloud_defend/credential_access_collection_sensitive_files_compression_inside_a_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/05/12"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -15,7 +15,7 @@ index = ["logs-cloud_defend*"]
1515
interval = "5m"
1616
language = "eql"
1717
license = "Elastic License v2"
18-
name = "Sensitive Files Compression Inside A Container"
18+
name = "Deprecated - Sensitive Files Compression Inside A Container"
1919
risk_score = 47
2020
rule_id = "475b42f0-61fb-4ef0-8a85-597458bfb0a1"
2121
severity = "medium"

rules/integrations/cloud_defend/credential_access_sensitive_keys_or_passwords_search_inside_a_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/05/12"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,7 +16,7 @@ index = ["logs-cloud_defend*"]
1616
interval = "5m"
1717
language = "eql"
1818
license = "Elastic License v2"
19-
name = "Sensitive Keys Or Passwords Searched For Inside A Container"
19+
name = "Deprecated - Sensitive Keys Or Passwords Searched For Inside A Container"
2020
references = ["https://sysdig.com/blog/cve-2021-25741-kubelet-falco/"]
2121
risk_score = 47
2222
rule_id = "9661ed8b-001c-40dc-a777-0983b7b0c91a"

rules/integrations/cloud_defend/defense_evasion_ld_preload_shared_object_modified_inside_a_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/06/06"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,7 +18,7 @@ index = ["logs-cloud_defend*"]
1818
interval = "5m"
1919
language = "eql"
2020
license = "Elastic License v2"
21-
name = "Modification of Dynamic Linker Preload Shared Object Inside A Container"
21+
name = "Deprecated - Modification of Dynamic Linker Preload Shared Object Inside A Container"
2222
references = [
2323
"https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/",
2424
"https://www.anomali.com/blog/rocke-evolves-its-arsenal-with-a-new-malware-family-written-in-golang/",

rules/integrations/cloud_defend/discovery_suspicious_network_tool_launched_inside_a_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/26"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -24,7 +24,7 @@ index = ["logs-cloud_defend*"]
2424
interval = "5m"
2525
language = "eql"
2626
license = "Elastic License v2"
27-
name = "Suspicious Network Tool Launched Inside A Container"
27+
name = "Deprecated - Suspicious Network Tool Launched Inside A Container"
2828
risk_score = 47
2929
rule_id = "1a289854-5b78-49fe-9440-8a8096b1ab50"
3030
severity = "medium"

rules/integrations/cloud_defend/execution_container_management_binary_launched_inside_a_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/26"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -24,7 +24,7 @@ index = ["logs-cloud_defend*"]
2424
interval = "5m"
2525
language = "eql"
2626
license = "Elastic Licence v2"
27-
name = "Container Management Utility Run Inside A Container"
27+
name = "Deprecated - Container Management Utility Run Inside A Container"
2828
risk_score = 21
2929
rule_id = "6c6bb7ea-0636-44ca-b541-201478ef6b50"
3030
severity = "low"

rules/integrations/cloud_defend/execution_file_made_executable_via_chmod_inside_a_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/26"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,7 +16,7 @@ index = ["logs-cloud_defend*"]
1616
interval = "5m"
1717
language = "eql"
1818
license = "Elastic License v2"
19-
name = "File Made Executable via Chmod Inside A Container"
19+
name = "Deprecated - File Made Executable via Chmod Inside A Container"
2020
risk_score = 47
2121
rule_id = "ec604672-bed9-43e1-8871-cf591c052550"
2222
severity = "medium"

rules/integrations/cloud_defend/execution_interactive_exec_to_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/05/12"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ index = ["logs-cloud_defend*"]
2828
interval = "5m"
2929
language = "eql"
3030
license = "Elastic License v2"
31-
name = "Interactive Exec Command Launched Against A Running Container"
31+
name = "Deprecated - Interactive Exec Command Launched Against A Running Container"
3232
references = [
3333
"https://kubernetes.io/docs/tasks/debug/debug-application/debug-running-pod/",
3434
"https://kubernetes.io/docs/tasks/debug/debug-application/get-shell-running-container/",

rules/integrations/cloud_defend/execution_interactive_shell_spawned_from_inside_a_container.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/26"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/02/04"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -21,7 +21,7 @@ index = ["logs-cloud_defend*"]
2121
interval = "5m"
2222
language = "eql"
2323
license = "Elastic License v2"
24-
name = "Suspicious Interactive Shell Spawned From Inside A Container"
24+
name = "Deprecated - Suspicious Interactive Shell Spawned From Inside A Container"
2525
risk_score = 73
2626
rule_id = "8d3d0794-c776-476b-8674-ee2e685f6470"
2727
severity = "high"

0 commit comments

Comments
 (0)