Skip to content

Commit 489bcc4

Browse files
authored
Merge branch 'develop' into nterl0k-t1053-suspicious-task-lookups
2 parents f6646f5 + 44c8147 commit 489bcc4

File tree

305 files changed

+7935
-4309
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

305 files changed

+7935
-4309
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
name: Baseline Of Open S3 Bucket Decommissioning
2+
id: 984e9022-b87b-499a-a260-8d0282c46ea2
3+
version: 1
4+
date: '2025-02-12'
5+
author: Jose Hernandez
6+
type: Baseline
7+
status: production
8+
description: |-
9+
The following analytic identifies S3 buckets that were previously exposed to the public and have been subsequently deleted. It leverages AWS CloudTrail logs to track the lifecycle of potentially risky S3 bucket configurations. This activity is crucial for ensuring that public access to sensitive data is properly managed and decommissioned. By monitoring these events, organizations can ensure that exposed buckets are promptly deleted, reducing the risk of unauthorized access. Immediate investigation is recommended to confirm the proper decommissioning of these buckets and to ensure no sensitive data remains exposed. This baseline detection creates a lookup table of decommissioned buckets.csv and their associated events which can be used by detection searches to trigger alerts when decommissioned buckets are detected.
10+
11+
The following detections searches leverage this baseline search and the lookup table.
12+
* Detect DNS Query to Decommissioned S3 Bucket
13+
* Detect Web Access to Decommissioned S3 Bucket
14+
search: '`cloudtrail` eventSource="s3.amazonaws.com" (eventName=DeleteBucket OR eventName=PutBucketPolicy OR eventName=PutBucketWebsite)
15+
| spath input=_raw path=requestParameters.bucketName output=bucketName
16+
| spath input=_raw path=requestParameters.Host output=host
17+
| spath input=_raw path=requestParameters.bucketPolicy.Statement{} output=statements
18+
| spath input=statements output=principal path=Principal
19+
| spath input=statements output=effect path=Effect
20+
| spath input=statements output=action path=Action
21+
| stats values(eventName) as events,
22+
values(requestParameters.bucketPolicy) as policies,
23+
values(principal) as principals,
24+
values(effect) as effects,
25+
values(action) as actions,
26+
min(_time) as firstEvent,
27+
max(_time) as lastEvent,
28+
values(userIdentity.accountId) as accountIds,
29+
values(userIdentity.arn) as userARNs,
30+
values(awsRegion) as awsRegions,
31+
values(host) as hosts
32+
by bucketName
33+
| eval isPublicPolicy = if( (mvfind(principals, "\\*")>=0) AND (mvfind(effects, "Allow")>=0) AND (mvfind(actions, "s3:GetObject")>=0), 1, 0)
34+
| eval isWebsite = if(mvfind(events, "PutBucketWebsite")>=0, 1, 0)
35+
| eval is_open = if(isPublicPolicy==1 OR isWebsite==1, 1, 0)
36+
| where is_open==1 AND (mvfind(events, "DeleteBucket")>=0)
37+
| eval policy_details = if(isPublicPolicy==1, "Policy: Principal=" . mvjoin(principals, ", ") . " Effect=" . mvjoin(effects, ", ") . " Action=" . mvjoin(actions, ", "), "No Public Policy")
38+
| eval website_details = if(isWebsite==1, "Static Website Enabled", "No Website Hosting")
39+
| table bucketName, hosts, firstEvent, lastEvent, events, policy_details, website_details, accountIds, userARNs, awsRegions
40+
| outputlookup append=true decommissioned_buckets | `baseline_of_open_s3_bucket_decommissioning_filter`'
41+
how_to_implement: To implement this baseline, you need to have AWS CloudTrail logs being ingested into Splunk with the AWS Add-on properly configured. The search looks for S3 bucket events related to bucket policies, website hosting configuration, and bucket deletion. The results are stored in a lookup KVStore named decommissioned_buckets which tracks the history of deleted buckets that were previously exposed to the public.
42+
known_false_positives: Some buckets may be intentionally made public for legitimate business purposes before being decommissioned. Review the policy_details and website_details fields to understand the nature of the public access that was configured.
43+
references:
44+
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
45+
- https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
46+
- https://aws.amazon.com/premiumsupport/knowledge-center/secure-s3-resources/
47+
tags:
48+
analytic_story:
49+
- AWS S3 Bucket Security Monitoring
50+
- Suspicious AWS S3 Activities
51+
product:
52+
- Splunk Enterprise
53+
- Splunk Enterprise Security
54+
- Splunk Cloud
55+
detections:
56+
- Detect DNS Query to Decommissioned S3 Bucket
57+
- Detect Web Access to Decommissioned S3 Bucket
58+
security_domain: audit
59+
deployment:
60+
scheduling:
61+
cron_schedule: 0 2 * * 0
62+
earliest_time: -30d@d
63+
latest_time: -1d@d
64+
schedule_window: auto

contentctl.yml

Lines changed: 28 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.0.0
6+
version: 5.1.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU
@@ -30,17 +30,23 @@ splunk_api_username: null
3030
post_test_behavior: pause_on_failure
3131
apps:
3232
- uid: 1621
33-
title: Splunk Common Information Model (CIM)
33+
title: Splunk_SA_CIM
3434
appid: Splunk_SA_CIM
35-
version: 6.0.1
35+
version: 6.0.2
3636
description: description of app
37-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-common-information-model-cim_601.tgz
37+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-common-information-model-cim_602.tgz
3838
- uid: 6553
3939
title: Splunk Add-on for Okta Identity Cloud
4040
appid: Splunk_TA_okta_identity_cloud
4141
version: 3.0.0
4242
description: description of app
4343
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-okta-identity-cloud_300.tgz
44+
- uid: 7404
45+
title: Cisco Security Cloud
46+
appid: CiscoSecurityCloud
47+
version: 3.1.1
48+
description: description of app
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_311.tgz
4450
- uid: 6652
4551
title: Add-on for Linux Sysmon
4652
appid: Splunk_TA_linux_sysmon
@@ -77,9 +83,9 @@ apps:
7783
- uid: 5579
7884
title: Splunk Add-on for CrowdStrike FDR
7985
appid: Splunk_TA_CrowdStrike_FDR
80-
version: 2.0.4
86+
version: 2.0.3
8187
description: description of app
82-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_204.tgz
88+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_203.tgz
8389
- uid: 3185
8490
title: Splunk Add-on for Microsoft IIS
8591
appid: SPLUNK_TA_FOR_IIS
@@ -137,9 +143,9 @@ apps:
137143
- uid: 1876
138144
title: Splunk Add-on for AWS
139145
appid: Splunk_TA_aws
140-
version: 7.9.0
146+
version: 7.9.1
141147
description: description of app
142-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_790.tgz
148+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_791.tgz
143149
- uid: 3088
144150
title: Splunk Add-on for Google Cloud Platform
145151
appid: SPLUNK_ADD_ON_FOR_GOOGLE_CLOUD_PLATFORM
@@ -149,21 +155,21 @@ apps:
149155
- uid: 5556
150156
title: Splunk Add-on for Google Workspace
151157
appid: SPLUNK_ADD_ON_FOR_GOOGLE_WORKSPACE
152-
version: 3.0.2
158+
version: 3.0.3
153159
description: description of app
154-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_302.tgz
160+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_303.tgz
155161
- uid: 3110
156162
title: Splunk Add-on for Microsoft Cloud Services
157163
appid: SPLUNK_TA_MICROSOFT_CLOUD_SERVICES
158-
version: 5.4.2
164+
version: 5.4.3
159165
description: description of app
160-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_542.tgz
166+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_543.tgz
161167
- uid: 4055
162168
title: Splunk Add-on for Microsoft Office 365
163169
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365
164-
version: 4.7.0
170+
version: 4.8.0
165171
description: description of app
166-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_470.tgz
172+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_480.tgz
167173
- uid: 2890
168174
title: Splunk Machine Learning Toolkit
169175
appid: SPLUNK_MACHINE_LEARNING_TOOLKIT
@@ -206,10 +212,17 @@ apps:
206212
version: 4.2.2
207213
description: PSC for MLTK
208214
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/python-for-scientific-computing-for-linux-64-bit_422.tgz
215+
- uid: 6254
216+
title: Splunk Add-on for Github
217+
appid: Splunk_TA_github
218+
version: 3.1.0
219+
description: description of app
220+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-github_310.tgz
209221
- uid: 2882
210222
title: Splunk Add-on for AppDynamics
211223
appid: Splunk_TA_AppDynamics
212224
version: 3.0.0
213-
description: The Splunk Add-on for AppDynamics enables you to easily configure data inputs to pull data from AppDynamics' REST APIs
225+
description: The Splunk Add-on for AppDynamics enables you to easily configure data
226+
inputs to pull data from AppDynamics' REST APIs
214227
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-appdynamics_300.tgz
215228
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd

data_sources/asl_aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ separator: api.operation
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1

data_sources/aws_cloudfront.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: aws:cloudfront:accesslogs
99
supported_TA:
1010
- name: Splunk Add-on for AWS
1111
url: https://splunkbase.splunk.com/app/1876
12-
version: 7.9.0
12+
version: 7.9.1
1313
fields:
1414
- _time
1515
- action

data_sources/aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1

data_sources/aws_cloudtrail_assumerolewithsaml.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_consolelogin.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_copyobject.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- additionalEventData.AuthenticationMethod

data_sources/aws_cloudtrail_createaccesskey.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_createkey.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- app

0 commit comments

Comments
 (0)