Skip to content

Commit fde93c6

Browse files
committed
convert csv lookup to kvstore lookup.
Update references in description files as well.
1 parent bdb7959 commit fde93c6

File tree

4 files changed

+19
-7
lines changed

4 files changed

+19
-7
lines changed

baselines/baseline_of_open_s3_bucket_decommissioning.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ search: '`cloudtrail` eventSource="s3.amazonaws.com" (eventName=DeleteBucket OR
3838
| eval website_details = if(isWebsite==1, "Static Website Enabled", "No Website Hosting")
3939
| table bucketName, hosts, firstEvent, lastEvent, events, policy_details, website_details, accountIds, userARNs, awsRegions
4040
| outputlookup append=true decommissioned_buckets | `baseline_of_open_s3_bucket_decommissioning_filter`'
41-
how_to_implement: To implement this baseline, you need to have AWS CloudTrail logs being ingested into Splunk with the AWS Add-on properly configured. The search looks for S3 bucket events related to bucket policies, website hosting configuration, and bucket deletion. The results are stored in a lookup file named decommissioned_buckets.csv which tracks the history of deleted buckets that were previously exposed to the public.
41+
how_to_implement: To implement this baseline, you need to have AWS CloudTrail logs being ingested into Splunk with the AWS Add-on properly configured. The search looks for S3 bucket events related to bucket policies, website hosting configuration, and bucket deletion. The results are stored in a lookup KVStore named decommissioned_buckets which tracks the history of deleted buckets that were previously exposed to the public.
4242
known_false_positives: Some buckets may be intentionally made public for legitimate business purposes before being decommissioned. Review the policy_details and website_details fields to understand the nature of the public access that was configured.
4343
references:
4444
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html

detections/network/detect_dns_query_to_decommissioned_s3_bucket.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1616
| lookup decommissioned_buckets bucketName as bucket_domain OUTPUT bucketName as match
1717
| where isnotnull(match)
1818
| `detect_dns_query_to_decommissioned_s3_bucket_filter`'
19-
how_to_implement: To successfully implement this detection, you need to be ingesting DNS query logs and have them mapped to the Network_Resolution data model. Additionally, ensure that the baseline search "Baseline Of Open S3 Bucket Decommissioning" is running and populating the decommissioned_buckets.csv lookup file.
19+
how_to_implement: To successfully implement this detection, you need to be ingesting DNS query logs and have them mapped to the Network_Resolution data model. Additionally, ensure that the baseline search "Baseline Of Open S3 Bucket Decommissioning" is running and populating the decommissioned_buckets KVstore lookup.
2020
known_false_positives: Some applications or scripts may continue to reference old S3 bucket names after they have been decommissioned. These should be investigated and updated to prevent potential security risks.
2121
references:
2222
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
@@ -47,7 +47,7 @@ tags:
4747
- Splunk Enterprise Security
4848
- Splunk Cloud
4949
security_domain: network
50-
manual_test: This search needs a lookup table to be populated -decommissioned_buckets.csv by running a baseline search `Baseline Of Open S3 Bucket Decommissioning` prior to running this detection.
50+
manual_test: This search needs a lookup table to be populated in decommissioned_buckets KVStore Lookup by running a baseline search `Baseline Of Open S3 Bucket Decommissioning` prior to running this detection.
5151
tests:
5252
- name: Baseline Dataset Test
5353
attack_data:

detections/web/detect_web_access_to_decommissioned_s3_bucket.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1616
| lookup decommissioned_buckets bucketName as bucket_domain OUTPUT bucketName as match
1717
| where isnotnull(match)
1818
| `detect_web_access_to_decommissioned_s3_bucket_filter`'
19-
how_to_implement: To successfully implement this detection, you need to be ingesting web proxy logs and have them mapped to the Web data model. Additionally, ensure that the baseline search "Baseline Of Open S3 Bucket Decommissioning" is running and populating the decommissioned_buckets.csv lookup file.
19+
how_to_implement: To successfully implement this detection, you need to be ingesting web proxy logs and have them mapped to the Web data model. Additionally, ensure that the baseline search "Baseline Of Open S3 Bucket Decommissioning" is running and populating the decommissioned_buckets KVStore Lookup.
2020
known_false_positives: Some applications or web pages may continue to reference old S3 bucket URLs after they have been decommissioned. These should be investigated and updated to prevent potential security risks.
2121
references:
2222
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
@@ -51,7 +51,7 @@ tags:
5151
- Splunk Enterprise Security
5252
- Splunk Cloud
5353
security_domain: network
54-
manual_test: This search needs a lookup table to be populated - decommissioned_buckets.csv by running a baseline search `Baseline Of Open S3 Bucket Decommissioning` prior to running this detection.
54+
manual_test: This search needs a lookup table to be populated the decommissioned_buckets KVStore Lookup by running a baseline search `Baseline Of Open S3 Bucket Decommissioning` prior to running this detection.
5555
tests:
5656
- name: Baseline Dataset Test
5757
attack_data:

lookups/decommissioned_buckets.yml

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,19 @@ date: 2025-02-14
33
version: 1
44
id: b3a95eff-87cf-40f3-b6e0-5b1a11eed68f
55
author: Bhavin Patel
6-
lookup_type: csv
6+
lookup_type: kvstore
77
default_match: false
88
description: A lookup table of decommissioned S3 buckets created by baseline - Baseline of Open S3 Bucket Decommissioning. This lookup table is used by detections searches to trigger alerts when decommissioned buckets are detected.
9-
min_matches: 1
9+
min_matches: 1
10+
fields:
11+
- _key
12+
- bucketName
13+
- hosts
14+
- firstEvent
15+
- lastEvent
16+
- events
17+
- policy_details
18+
- website_details
19+
- accountIds
20+
- userARNs
21+
- awsRegions

0 commit comments

Comments
 (0)