|
1 | 1 | { |
2 | 2 | "Provider": "oraclecloud", |
3 | 3 | "CheckID": "events_rule_iam_policy_changes", |
4 | | - "CheckTitle": "Ensure a notification is configured for IAM policy changes", |
5 | | - "CheckType": [ |
6 | | - "Software and Configuration Checks", |
7 | | - "Industry and Regulatory Standards", |
8 | | - "CIS OCI Foundations Benchmark" |
9 | | - ], |
| 4 | + "CheckTitle": "Event rule monitoring IAM policy changes has notification actions configured", |
| 5 | + "CheckType": [], |
10 | 6 | "ServiceName": "events", |
11 | 7 | "SubServiceName": "", |
12 | | - "ResourceIdTemplate": "oci:events:rule", |
13 | | - "Severity": "medium", |
14 | | - "ResourceType": "OciEventsRule", |
| 8 | + "ResourceIdTemplate": "", |
| 9 | + "Severity": "high", |
| 10 | + "ResourceType": "EventRule", |
15 | 11 | "ResourceGroup": "messaging", |
16 | | - "Description": "Event rules should be configured to notify on IAM policy changes.", |
17 | | - "Risk": "Without proper event monitoring, security-relevant changes may go unnoticed.", |
18 | | - "RelatedUrl": "https://docs.oracle.com/en-us/iaas/Content/Events/home.htm", |
| 12 | + "Description": "**OCI Events rules** configured to capture **IAM policy create, update, and delete** events (`com.oraclecloud.identitycontrolplane.createpolicy`, `com.oraclecloud.identitycontrolplane.updatepolicy`, `com.oraclecloud.identitycontrolplane.deletepolicy`) and include a **notification action**.", |
| 13 | + "Risk": "Without alerts on **IAM policy changes**, permissions can be altered unnoticed, enabling **privilege escalation**, unauthorized data access, and persistent footholds. Delayed visibility degrades **confidentiality** and **integrity** and slows incident response across compartments.", |
| 14 | + "RelatedUrl": "", |
| 15 | + "AdditionalURLs": [ |
| 16 | + "https://docs.oracle.com/en-us/iaas/Content/Events/home.htm" |
| 17 | + ], |
19 | 18 | "Remediation": { |
20 | 19 | "Code": { |
21 | | - "CLI": "oci events rule create --display-name <name> --condition <event-condition> --actions <notification-actions>", |
| 20 | + "CLI": "oci events rule create --compartment-id <compartment_ocid> --display-name <example_resource_name> --condition '{\"eventType\":[\"com.oraclecloud.identitycontrolplane.createpolicy\",\"com.oraclecloud.identitycontrolplane.deletepolicy\",\"com.oraclecloud.identitycontrolplane.updatepolicy\"]}' --actions '{\"actions\":[{\"actionType\":\"ONS\",\"topicId\":\"<topic_ocid>\"}]}'", |
22 | 21 | "NativeIaC": "", |
23 | | - "Other": "1. Navigate to Observability & Management > Events Service\n2. Create a new rule\n3. Configure the event condition\n4. Add notification action\n5. Save the rule", |
24 | | - "Terraform": "resource \"oci_events_rule\" \"example\" {\n display_name = \"rule\"\n is_enabled = true\n condition = jsonencode({\n eventType = [\"com.oraclecloud.*\"]\n })\n actions {\n actions {\n action_type = \"ONS\"\n topic_id = var.topic_id\n }\n }\n}" |
| 22 | + "Other": "1. In the OCI Console, go to Observability & Management > Events Service\n2. Click Create Rule and set Display Name (leave Enabled)\n3. Under Conditions, choose Event Type, set Service Name to Identity and Access Management, and select:\n - com.oraclecloud.identitycontrolplane.createpolicy\n - com.oraclecloud.identitycontrolplane.deletepolicy\n - com.oraclecloud.identitycontrolplane.updatepolicy\n4. Under Actions, select Action Type: Notifications, then choose the target Topic\n5. Click Create", |
| 23 | + "Terraform": "```hcl\nresource \"oci_events_rule\" \"<example_resource_name>\" {\n compartment_id = var.compartment_id\n display_name = \"<example_resource_name>\"\n is_enabled = true\n\n # Critical: monitor IAM policy create/delete/update events\n condition = jsonencode({\n eventType = [\n \"com.oraclecloud.identitycontrolplane.createpolicy\",\n \"com.oraclecloud.identitycontrolplane.deletepolicy\",\n \"com.oraclecloud.identitycontrolplane.updatepolicy\"\n ]\n })\n\n actions {\n actions {\n action_type = \"ONS\" # Critical: adds a Notifications action\n topic_id = var.topic_id # Critical: target Notifications topic\n }\n }\n}\n```" |
25 | 24 | }, |
26 | 25 | "Recommendation": { |
27 | | - "Text": "Ensure a notification is configured for IAM policy changes", |
28 | | - "Url": "https://hub.prowler.com/check/oci/events_rule_iam_policy_changes" |
| 26 | + "Text": "Create OCI Events rules for `...createpolicy`, `...updatepolicy`, and `...deletepolicy` with a **notification action** to trusted channels. Enforce **least privilege** on IAM and Events administration, require change approvals, and routinely test alerting to ensure rapid detection.", |
| 27 | + "Url": "https://hub.prowler.com/check/events_rule_iam_policy_changes" |
29 | 28 | } |
30 | 29 | }, |
31 | 30 | "Categories": [ |
32 | | - "logging", |
33 | | - "monitoring" |
| 31 | + "identity-access" |
34 | 32 | ], |
35 | 33 | "DependsOn": [], |
36 | 34 | "RelatedTo": [], |
|
0 commit comments