Skip to content

Commit 06b4947

Browse files
authored
Merge branch 'develop' into installutil_improvement
2 parents 08b30b7 + c795cda commit 06b4947

9 files changed

+341
-2
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
name: Baseline Of Open S3 Bucket Decommissioning
2+
id: 984e9022-b87b-499a-a260-8d0282c46ea2
3+
version: 1
4+
date: '2025-02-12'
5+
author: Jose Hernandez
6+
type: Baseline
7+
status: production
8+
description: |-
9+
The following analytic identifies S3 buckets that were previously exposed to the public and have been subsequently deleted. It leverages AWS CloudTrail logs to track the lifecycle of potentially risky S3 bucket configurations. This activity is crucial for ensuring that public access to sensitive data is properly managed and decommissioned. By monitoring these events, organizations can ensure that exposed buckets are promptly deleted, reducing the risk of unauthorized access. Immediate investigation is recommended to confirm the proper decommissioning of these buckets and to ensure no sensitive data remains exposed. This baseline detection creates a lookup table of decommissioned buckets.csv and their associated events which can be used by detection searches to trigger alerts when decommissioned buckets are detected.
10+
11+
The following detections searches leverage this baseline search and the lookup table.
12+
* Detect DNS Query to Decommissioned S3 Bucket
13+
* Detect Web Access to Decommissioned S3 Bucket
14+
search: '`cloudtrail` eventSource="s3.amazonaws.com" (eventName=DeleteBucket OR eventName=PutBucketPolicy OR eventName=PutBucketWebsite)
15+
| spath input=_raw path=requestParameters.bucketName output=bucketName
16+
| spath input=_raw path=requestParameters.Host output=host
17+
| spath input=_raw path=requestParameters.bucketPolicy.Statement{} output=statements
18+
| spath input=statements output=principal path=Principal
19+
| spath input=statements output=effect path=Effect
20+
| spath input=statements output=action path=Action
21+
| stats values(eventName) as events,
22+
values(requestParameters.bucketPolicy) as policies,
23+
values(principal) as principals,
24+
values(effect) as effects,
25+
values(action) as actions,
26+
min(_time) as firstEvent,
27+
max(_time) as lastEvent,
28+
values(userIdentity.accountId) as accountIds,
29+
values(userIdentity.arn) as userARNs,
30+
values(awsRegion) as awsRegions,
31+
values(host) as hosts
32+
by bucketName
33+
| eval isPublicPolicy = if( (mvfind(principals, "\\*")>=0) AND (mvfind(effects, "Allow")>=0) AND (mvfind(actions, "s3:GetObject")>=0), 1, 0)
34+
| eval isWebsite = if(mvfind(events, "PutBucketWebsite")>=0, 1, 0)
35+
| eval is_open = if(isPublicPolicy==1 OR isWebsite==1, 1, 0)
36+
| where is_open==1 AND (mvfind(events, "DeleteBucket")>=0)
37+
| eval policy_details = if(isPublicPolicy==1, "Policy: Principal=" . mvjoin(principals, ", ") . " Effect=" . mvjoin(effects, ", ") . " Action=" . mvjoin(actions, ", "), "No Public Policy")
38+
| eval website_details = if(isWebsite==1, "Static Website Enabled", "No Website Hosting")
39+
| table bucketName, hosts, firstEvent, lastEvent, events, policy_details, website_details, accountIds, userARNs, awsRegions
40+
| outputlookup append=true decommissioned_buckets | `baseline_of_open_s3_bucket_decommissioning_filter`'
41+
how_to_implement: To implement this baseline, you need to have AWS CloudTrail logs being ingested into Splunk with the AWS Add-on properly configured. The search looks for S3 bucket events related to bucket policies, website hosting configuration, and bucket deletion. The results are stored in a lookup KVStore named decommissioned_buckets which tracks the history of deleted buckets that were previously exposed to the public.
42+
known_false_positives: Some buckets may be intentionally made public for legitimate business purposes before being decommissioned. Review the policy_details and website_details fields to understand the nature of the public access that was configured.
43+
references:
44+
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
45+
- https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
46+
- https://aws.amazon.com/premiumsupport/knowledge-center/secure-s3-resources/
47+
tags:
48+
analytic_story:
49+
- AWS S3 Bucket Security Monitoring
50+
- Suspicious AWS S3 Activities
51+
product:
52+
- Splunk Enterprise
53+
- Splunk Enterprise Security
54+
- Splunk Cloud
55+
detections:
56+
- Detect DNS Query to Decommissioned S3 Bucket
57+
- Detect Web Access to Decommissioned S3 Bucket
58+
security_domain: audit
59+
deployment:
60+
scheduling:
61+
cron_schedule: 0 2 * * 0
62+
earliest_time: -30d@d
63+
latest_time: -1d@d
64+
schedule_window: auto

contentctl.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,12 @@ apps:
4141
version: 3.0.0
4242
description: description of app
4343
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-okta-identity-cloud_300.tgz
44+
- uid: 7404
45+
title: Cisco Security Cloud
46+
appid: CiscoSecurityCloud
47+
version: 3.0.1
48+
description: description of app
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_301.tgz
4450
- uid: 6652
4551
title: Add-on for Linux Sysmon
4652
appid: Splunk_TA_linux_sysmon
@@ -77,9 +83,9 @@ apps:
7783
- uid: 5579
7884
title: Splunk Add-on for CrowdStrike FDR
7985
appid: Splunk_TA_CrowdStrike_FDR
80-
version: 2.0.4
86+
version: 2.0.3
8187
description: description of app
82-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_204.tgz
88+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_203.tgz
8389
- uid: 3185
8490
title: Splunk Add-on for Microsoft IIS
8591
appid: SPLUNK_TA_FOR_IIS
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
name: Cisco AI Defense Alerts
2+
id: cbb06880-9dd9-4542-ac60-bd6e1d3c3e4e
3+
version: 1
4+
date: '2024-07-18'
5+
author: Bhavin Patel
6+
description: Data source object for Cisco AI Defense Alerts
7+
source: cisco_ai_defense
8+
sourcetype: cisco:ai:defense
9+
separator:
10+
supported_TA:
11+
- name: Cisco Security Cloud
12+
url: https://splunkbase.splunk.com/app/7404
13+
version: 3.0.1
14+
fields:
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
name: Cisco AI Defense Security Alerts by Application Name
2+
id: 105e4a69-ec55-49fc-be1f-902467435ea8
3+
version: 1
4+
date: '2025-02-14'
5+
author: Bhavin Patel, Splunk
6+
status: experimental
7+
type: Anomaly
8+
description: The search surfaces alerts from the Cisco AI Defense product for potential attacks against the AI models running in your environment. This analytic identifies security events within Cisco AI Defense by examining event messages, actions, and policy names. It focuses on connections and applications associated with specific guardrail entities and ruleset types. By aggregating and analyzing these elements, the search helps detect potential policy violations and security threats, enabling proactive defense measures and ensuring network integrity.
9+
data_source:
10+
- Cisco AI Defense Alerts
11+
search: |-
12+
`cisco_ai_defense`
13+
| rename genai_application.application_name as application_name
14+
| rename connection.connection_name as connection_name
15+
```Aggregating data by model name, connection name, application name, application ID, and user ID```
16+
| stats count
17+
values(user_id) as user_id
18+
values(event_message_type) as event_message_type
19+
values(event_action) as event_action
20+
values(policy.policy_name) as policy_name
21+
values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_entity.guardrail_entity_name) as guardrail_entity_name
22+
values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_ruleset.guardrail_ruleset_type) as guardrail_ruleset_type
23+
by model.model_name connection_name application_name application_id
24+
```Evaluating severity based on policy name and guardrail ruleset type```
25+
| eval severity=case(
26+
policy_name IN ("AI Runtime Latency Testing - Prompt Injection"), "critical",
27+
policy_name IN ("AI Runtime Latency Testing - Code Detection"), "high",
28+
guardrail_ruleset_type IN ("Toxicity"), "medium",
29+
true(), "low"
30+
)
31+
```Calculating risk score based on severity level```
32+
| eval risk_score=case(
33+
severity="critical", 100,
34+
severity="high", 75,
35+
severity="medium", 50,
36+
severity="low", 25
37+
)
38+
| table model.model_name, user_id, event_action, application_id, application_name, severity, risk_score, policy_name, connection_name, guardrail_ruleset_type, guardrail_entity_name
39+
|`cisco_ai_defense_security_alerts_by_application_name_filter`'
40+
how_to_implement: To enable this detection, you need to ingest alerts from the Cisco AI Defense product. This can be done by using this app from splunkbase - Cisco Security Cloud and ingest alerts into the cisco:ai:defense sourcetype.
41+
known_false_positives: False positives may vary based on Cisco AI Defense configuration; monitor and filter out the alerts that are not relevant to your environment.
42+
references:
43+
- https://www.robustintelligence.com/blog-posts/prompt-injection-attack-on-gpt-4
44+
- https://docs.aws.amazon.com/prescriptive-guidance/latest/llm-prompt-engineering-best-practices/common-attacks.html
45+
drilldown_searches:
46+
- name: View risk events for the last 7 days for - "$application_id$"
47+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$application_id$" ) starthoursago=168 | stats count min(_time)
48+
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
49+
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
50+
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
51+
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
52+
earliest_offset: $info_min_time$
53+
latest_offset: $info_max_time$
54+
rba:
55+
message: Cisco AI Defense Security Alert has been action - [$event_action$] for the application name - [$application_name$]
56+
risk_objects:
57+
- field: application_name
58+
type: other
59+
score: 10
60+
threat_objects: []
61+
tags:
62+
analytic_story:
63+
- Critical Alerts
64+
asset_type: Web Application
65+
product:
66+
- Splunk Enterprise
67+
- Splunk Enterprise Security
68+
- Splunk Cloud
69+
security_domain: endpoint
70+
tests:
71+
- name: True Positive Test
72+
attack_data:
73+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/suspicious_behaviour/cisco_ai_defense_alerts/cisco_ai_defense.log
74+
source: cisco_ai_defense
75+
sourcetype: cisco:ai:defense
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
name: Detect DNS Query to Decommissioned S3 Bucket
2+
id: 2f1c5fd1-4b8a-4f5d-a0e9-7d6a8e2f5e1e
3+
version: 1
4+
date: '2025-02-12'
5+
author: Jose Hernandez, Splunk
6+
status: experimental
7+
type: Anomaly
8+
description: This detection identifies DNS queries to domains that match previously decommissioned S3 buckets. This activity is significant because attackers may attempt to recreate deleted S3 buckets that were previously public to hijack them for malicious purposes. If successful, this could allow attackers to host malicious content or exfiltrate data through compromised bucket names that may still be referenced by legitimate applications.
9+
data_source:
10+
- Sysmon EventID 22
11+
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Network_Resolution where DNS.message_type=QUERY by DNS.query DNS.src
12+
| `drop_dm_object_name("DNS")`
13+
| `security_content_ctime(firstTime)`
14+
| `security_content_ctime(lastTime)`
15+
| eval bucket_domain = lower(query)
16+
| lookup decommissioned_buckets bucketName as bucket_domain OUTPUT bucketName as match
17+
| where isnotnull(match)
18+
| `detect_dns_query_to_decommissioned_s3_bucket_filter`'
19+
how_to_implement: To successfully implement this detection, you need to be ingesting DNS query logs and have them mapped to the Network_Resolution data model. Additionally, ensure that the baseline search "Baseline Of Open S3 Bucket Decommissioning" is running and populating the decommissioned_buckets KVstore lookup.
20+
known_false_positives: Some applications or scripts may continue to reference old S3 bucket names after they have been decommissioned. These should be investigated and updated to prevent potential security risks.
21+
references:
22+
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
23+
- https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
24+
drilldown_searches:
25+
- name: DNS Activity for Host
26+
search: '| from datamodel:Network_Resolution | search src="$src$"'
27+
earliest_offset: -7d@d
28+
latest_offset: now
29+
rba:
30+
message: A DNS query to decommissioned S3 bucket $query$ was detected from host $src$
31+
risk_objects:
32+
- field: src
33+
type: system
34+
score: 30
35+
threat_objects:
36+
- field: query
37+
type: domain
38+
tags:
39+
analytic_story:
40+
- AWS S3 Bucket Security Monitoring
41+
- Data Destruction
42+
asset_type: Network
43+
mitre_attack_id:
44+
- T1485
45+
product:
46+
- Splunk Enterprise
47+
- Splunk Enterprise Security
48+
- Splunk Cloud
49+
security_domain: network
50+
tests:
51+
- name: Baseline Dataset Test
52+
attack_data:
53+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1485/decommissioned_buckets/cloudtrail.json
54+
source: cloudtrail
55+
sourcetype: aws:cloudtrail
56+
- name: True Positive Test
57+
attack_data:
58+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1485/decommissioned_buckets/dns.log
59+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
60+
sourcetype: XmlWinEventLog
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
name: Detect Web Access to Decommissioned S3 Bucket
2+
id: 3a1d8f62-5b9c-4e7d-b8f3-9d6a8e2f5e1f
3+
version: 1
4+
date: '2025-02-12'
5+
author: Jose Hernandez, Splunk
6+
status: experimental
7+
type: Anomaly
8+
description: This detection identifies web requests to domains that match previously decommissioned S3 buckets through web proxy logs. This activity is significant because attackers may attempt to access or recreate deleted S3 buckets that were previously public to hijack them for malicious purposes. If successful, this could allow attackers to host malicious content or exfiltrate data through compromised bucket names that may still be referenced by legitimate applications.
9+
data_source:
10+
- AWS Cloudfront
11+
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime values(Web.http_method) as http_method values(Web.http_user_agent) as http_user_agent values(Web.url) as url values(Web.user) as user from datamodel=Web where Web.url_domain!="" by Web.src Web.url_domain
12+
| `drop_dm_object_name("Web")`
13+
| `security_content_ctime(firstTime)`
14+
| `security_content_ctime(lastTime)`
15+
| eval bucket_domain = lower(url_domain)
16+
| lookup decommissioned_buckets bucketName as bucket_domain OUTPUT bucketName as match
17+
| where isnotnull(match)
18+
| `detect_web_access_to_decommissioned_s3_bucket_filter`'
19+
how_to_implement: To successfully implement this detection, you need to be ingesting web proxy logs and have them mapped to the Web data model. Additionally, ensure that the baseline search "Baseline Of Open S3 Bucket Decommissioning" is running and populating the decommissioned_buckets KVStore Lookup.
20+
known_false_positives: Some applications or web pages may continue to reference old S3 bucket URLs after they have been decommissioned. These should be investigated and updated to prevent potential security risks.
21+
references:
22+
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
23+
- https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
24+
drilldown_searches:
25+
- name: Web Activity for Host and User
26+
search: '| from datamodel:Web | search src="$src$" user="$user$"'
27+
earliest_offset: -7d@d
28+
latest_offset: now
29+
- name: Investigate traffic to domain
30+
search: '| from datamodel:Web | search src="$src$" url_domain="$url_domain$"'
31+
earliest_offset: -7d@d
32+
latest_offset: now
33+
rba:
34+
message: A web request to decommissioned S3 bucket domain $url_domain$ was detected from host $src$ by user $user$
35+
risk_objects:
36+
- field: src
37+
type: system
38+
score: 30
39+
threat_objects:
40+
- field: url_domain
41+
type: domain
42+
tags:
43+
analytic_story:
44+
- AWS S3 Bucket Security Monitoring
45+
- Data Destruction
46+
asset_type: S3 Bucket
47+
mitre_attack_id:
48+
- T1485
49+
product:
50+
- Splunk Enterprise
51+
- Splunk Enterprise Security
52+
- Splunk Cloud
53+
security_domain: network
54+
tests:
55+
- name: Baseline Dataset Test
56+
attack_data:
57+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1485/decommissioned_buckets/cloudtrail.json
58+
source: cloudtrail
59+
sourcetype: aws:cloudtrail
60+
- name: True Positive Test
61+
attack_data:
62+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1485/decommissioned_buckets/web_cloudfront_access.log
63+
source: aws_cloudfront_accesslogs
64+
sourcetype: aws:cloudfront:accesslogs

lookups/decommissioned_buckets.yml

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
name: decommissioned_buckets
2+
date: 2025-02-14
3+
version: 1
4+
id: b3a95eff-87cf-40f3-b6e0-5b1a11eed68f
5+
author: Bhavin Patel
6+
lookup_type: kvstore
7+
default_match: false
8+
description: A lookup table of decommissioned S3 buckets created by baseline - Baseline of Open S3 Bucket Decommissioning. This lookup table is used by detections searches to trigger alerts when decommissioned buckets are detected.
9+
min_matches: 1
10+
fields:
11+
- _key
12+
- bucketName
13+
- hosts
14+
- firstEvent
15+
- lastEvent
16+
- events
17+
- policy_details
18+
- website_details
19+
- accountIds
20+
- userARNs
21+
- awsRegions

macros/cisco_ai_defense.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
definition: sourcetype=cisco:ai:defense
2+
description: customer specific splunk configurations(eg- index, source, sourcetype).
3+
Replace the macro definition with configurations for your Splunk Environment.
4+
name: cisco_ai_defense
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
name: AWS S3 Bucket Security Monitoring
2+
id: 8d74f258-d69e-4e4f-b7b3-57c0bdc772b5
3+
version: 1
4+
date: '2025-02-12'
5+
author: Jose Hernandez, Splunk
6+
status: production
7+
description: This analytic story contains detections that monitor AWS S3 bucket configurations, access patterns, and potential security risks, with a specific focus on tracking decommissioned public buckets to prevent bucket hijacking attempts.
8+
narrative: 'Amazon Simple Storage Service (S3) is a widely used object storage service that allows organizations to store and retrieve any amount of data. While S3 buckets are private by default, they can be configured for public access through bucket policies or static website hosting. This flexibility, while useful for legitimate purposes, can also lead to security risks if not properly managed.
9+
10+
A particularly concerning attack vector is the hijacking of decommissioned S3 buckets. When a public S3 bucket is deleted, its unique name becomes available for anyone to claim. Attackers can monitor for deleted buckets that were previously public and attempt to recreate them, potentially intercepting data from applications that still reference these buckets or using them to host malicious content.
11+
12+
This analytic story focuses on:
13+
1. Tracking S3 buckets that were public (via policy or website hosting) before deletion
14+
2. Detecting attempts to access or query these decommissioned bucket names
15+
3. Identifying potential bucket hijacking attempts
16+
4. Helping organizations maintain proper S3 bucket hygiene and prevent security incidents related to bucket name reuse
17+
18+
The detections in this story leverage AWS CloudTrail logs, DNS queries, and web proxy data to provide comprehensive monitoring of S3 bucket lifecycle and access patterns.'
19+
references:
20+
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
21+
- https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
22+
- https://aws.amazon.com/premiumsupport/knowledge-center/secure-s3-resources/
23+
tags:
24+
category:
25+
- Cloud Security
26+
product:
27+
- Splunk Security Analytics for AWS
28+
- Splunk Enterprise
29+
- Splunk Enterprise Security
30+
- Splunk Cloud
31+
usecase: Security Monitoring

0 commit comments

Comments
 (0)