-
Notifications
You must be signed in to change notification settings - Fork 456
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Replace Rule assets to have historical rule data and limit version to…
… 8.17.0
- Loading branch information
1 parent
6e14db1
commit 408e431
Showing
7,062 changed files
with
7,062 additions
and
0 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
1 change: 1 addition & 0 deletions
1
.../security_detection_engine/kibana/security_rule/000047bb-b27a-47ec-8b62-ef1a5d2c9e19.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
{"attributes": {"author": ["Elastic"], "description": "Detects attempts to modify a rule within an Okta policy. An adversary may attempt to modify an Okta policy rule in order to weaken an organization's security controls.", "false_positives": ["Consider adding exceptions to this rule to filter false positives if Okta MFA rules are regularly modified in your organization."], "index": ["filebeat-*", "logs-okta*"], "language": "kuery", "license": "Elastic License v2", "name": "Attempt to Modify an Okta Policy Rule", "note": "## Triage and analysis\n\n### Investigating Attempt to Modify an Okta Policy Rule\n\nThe modification of an Okta policy rule can be an indication of malicious activity as it may aim to weaken an organization's security controls.\n\n#### Possible investigation steps:\n\n- Identify the actor related to the alert by reviewing `okta.actor.id`, `okta.actor.type`, `okta.actor.alternate_id`, or `okta.actor.display_name` fields in the alert.\n- Review the `okta.client.user_agent.raw_user_agent` field to understand the device and software used by the actor.\n- Examine the `okta.outcome.reason` field for additional context around the modification attempt.\n- Check the `okta.outcome.result` field to confirm the rule modification attempt.\n- Check if there are multiple rule modification attempts from the same actor or IP address (`okta.client.ip`).\n- Check for successful logins immediately following the modification attempt.\n- Verify whether the actor's activity aligns with typical behavior or if any unusual activity took place around the time of the modification attempt.\n\n### False positive analysis:\n\n- Check if there were issues with the Okta system at the time of the modification attempt. This could indicate a system error rather than a genuine threat activity.\n- Check the geographical location (`okta.request.ip_chain.geographical_context`) and time of the modification attempt. If these match the actor's normal behavior, it might be a false positive.\n- Verify the actor's administrative rights to ensure they are correctly configured.\n\n### Response and remediation:\n\n- If unauthorized modification is confirmed, initiate the incident response process.\n- Immediately lock the affected actor account and require a password change.\n- Consider resetting MFA tokens for the actor and require re-enrollment.\n- Check if the compromised account was used to access or alter any sensitive data or systems.\n- If a specific modification technique was used, ensure your systems are patched or configured to prevent such techniques.\n- Assess the criticality of affected services and servers.\n- Work with your IT team to minimize the impact on users and maintain business continuity.\n- If multiple accounts are affected, consider a broader reset or audit of MFA tokens.\n- Implement security best practices [outlined](https://www.okta.com/blog/2019/10/9-admin-best-practices-to-keep-your-org-secure/) by Okta.\n- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).", "query": "event.dataset:okta.system and event.action:policy.rule.update\n", "references": ["https://help.okta.com/en/prod/Content/Topics/Security/Security_Policies.htm", "https://developer.okta.com/docs/reference/api/system-log/", "https://developer.okta.com/docs/reference/api/event-types/", "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy"], "related_integrations": [{"package": "okta", "version": "^2.0.0"}], "required_fields": [{"ecs": true, "name": "event.action", "type": "keyword"}, {"ecs": true, "name": "event.dataset", "type": "keyword"}], "risk_score": 21, "rule_id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19", "setup": "The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.", "severity": "low", "tags": ["Use Case: Identity and Access Audit", "Tactic: Defense Evasion", "Data Source: Okta"], "threat": [{"framework": "MITRE ATT&CK", "tactic": {"id": "TA0005", "name": "Defense Evasion", "reference": "https://attack.mitre.org/tactics/TA0005/"}, "technique": [{"id": "T1562", "name": "Impair Defenses", "reference": "https://attack.mitre.org/techniques/T1562/", "subtechnique": [{"id": "T1562.007", "name": "Disable or Modify Cloud Firewall", "reference": "https://attack.mitre.org/techniques/T1562/007/"}]}]}], "timestamp_override": "event.ingested", "type": "query", "version": 207}, "id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19", "type": "security-rule"} |
1 change: 1 addition & 0 deletions
1
...urity_detection_engine/kibana/security_rule/000047bb-b27a-47ec-8b62-ef1a5d2c9e19_102.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
{"attributes": {"author": ["Elastic"], "description": "Detects attempts to modify a rule within an Okta policy. An adversary may attempt to modify an Okta policy rule in order to weaken an organization's security controls.", "false_positives": ["Consider adding exceptions to this rule to filter false positives if Okta MFA rules are regularly modified in your organization."], "index": ["filebeat-*", "logs-okta*"], "language": "kuery", "license": "Elastic License v2", "name": "Attempt to Modify an Okta Policy Rule", "note": "", "query": "event.dataset:okta.system and event.action:policy.rule.update\n", "references": ["https://help.okta.com/en/prod/Content/Topics/Security/Security_Policies.htm", "https://developer.okta.com/docs/reference/api/system-log/", "https://developer.okta.com/docs/reference/api/event-types/", "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy"], "related_integrations": [{"package": "okta", "version": "^1.3.0"}], "required_fields": [{"ecs": true, "name": "event.action", "type": "keyword"}, {"ecs": true, "name": "event.dataset", "type": "keyword"}], "risk_score": 21, "rule_id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19", "setup": "The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.", "severity": "low", "tags": ["Elastic", "Identity", "Okta", "Continuous Monitoring", "SecOps", "Identity and Access", "Defense Evasion"], "threat": [{"framework": "MITRE ATT&CK", "tactic": {"id": "TA0005", "name": "Defense Evasion", "reference": "https://attack.mitre.org/tactics/TA0005/"}, "technique": [{"id": "T1562", "name": "Impair Defenses", "reference": "https://attack.mitre.org/techniques/T1562/", "subtechnique": [{"id": "T1562.007", "name": "Disable or Modify Cloud Firewall", "reference": "https://attack.mitre.org/techniques/T1562/007/"}]}]}], "timestamp_override": "event.ingested", "type": "query", "version": 102}, "id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19_102", "type": "security-rule"} |
1 change: 1 addition & 0 deletions
1
...urity_detection_engine/kibana/security_rule/000047bb-b27a-47ec-8b62-ef1a5d2c9e19_103.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
{"attributes": {"author": ["Elastic"], "description": "Detects attempts to modify a rule within an Okta policy. An adversary may attempt to modify an Okta policy rule in order to weaken an organization's security controls.", "false_positives": ["Consider adding exceptions to this rule to filter false positives if Okta MFA rules are regularly modified in your organization."], "index": ["filebeat-*", "logs-okta*"], "language": "kuery", "license": "Elastic License v2", "name": "Attempt to Modify an Okta Policy Rule", "note": "", "query": "event.dataset:okta.system and event.action:policy.rule.update\n", "references": ["https://help.okta.com/en/prod/Content/Topics/Security/Security_Policies.htm", "https://developer.okta.com/docs/reference/api/system-log/", "https://developer.okta.com/docs/reference/api/event-types/", "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy"], "related_integrations": [{"package": "okta", "version": "^1.3.0"}], "required_fields": [{"ecs": true, "name": "event.action", "type": "keyword"}, {"ecs": true, "name": "event.dataset", "type": "keyword"}], "risk_score": 21, "rule_id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19", "setup": "The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.", "severity": "low", "tags": ["Use Case: Identity and Access Audit", "Data Source: Okta", "Use Case: Identity and Access Audit", "Tactic: Defense Evasion"], "threat": [{"framework": "MITRE ATT&CK", "tactic": {"id": "TA0005", "name": "Defense Evasion", "reference": "https://attack.mitre.org/tactics/TA0005/"}, "technique": [{"id": "T1562", "name": "Impair Defenses", "reference": "https://attack.mitre.org/techniques/T1562/", "subtechnique": [{"id": "T1562.007", "name": "Disable or Modify Cloud Firewall", "reference": "https://attack.mitre.org/techniques/T1562/007/"}]}]}], "timestamp_override": "event.ingested", "type": "query", "version": 103}, "id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19_103", "type": "security-rule"} |
1 change: 1 addition & 0 deletions
1
...urity_detection_engine/kibana/security_rule/000047bb-b27a-47ec-8b62-ef1a5d2c9e19_104.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
{"attributes": {"author": ["Elastic"], "description": "Detects attempts to modify a rule within an Okta policy. An adversary may attempt to modify an Okta policy rule in order to weaken an organization's security controls.", "false_positives": ["Consider adding exceptions to this rule to filter false positives if Okta MFA rules are regularly modified in your organization."], "index": ["filebeat-*", "logs-okta*"], "language": "kuery", "license": "Elastic License v2", "name": "Attempt to Modify an Okta Policy Rule", "note": "## Triage and analysis\n\n### Investigating Attempt to Modify an Okta Policy Rule\n\nThe modification of an Okta policy rule can be an indication of malicious activity as it may aim to weaken an organization's security controls.\n\n#### Possible investigation steps:\n\n- Identify the actor related to the alert by reviewing `okta.actor.id`, `okta.actor.type`, `okta.actor.alternate_id`, or `okta.actor.display_name` fields in the alert.\n- Review the `okta.client.user_agent.raw_user_agent` field to understand the device and software used by the actor.\n- Examine the `okta.outcome.reason` field for additional context around the modification attempt.\n- Check the `okta.outcome.result` field to confirm the rule modification attempt.\n- Check if there are multiple rule modification attempts from the same actor or IP address (`okta.client.ip`).\n- Check for successful logins immediately following the modification attempt.\n- Verify whether the actor's activity aligns with typical behavior or if any unusual activity took place around the time of the modification attempt.\n\n### False positive analysis:\n\n- Check if there were issues with the Okta system at the time of the modification attempt. This could indicate a system error rather than a genuine threat activity.\n- Check the geographical location (`okta.request.ip_chain.geographical_context`) and time of the modification attempt. If these match the actor's normal behavior, it might be a false positive.\n- Verify the actor's administrative rights to ensure they are correctly configured.\n\n### Response and remediation:\n\n- If unauthorized modification is confirmed, initiate the incident response process.\n- Immediately lock the affected actor account and require a password change.\n- Consider resetting MFA tokens for the actor and require re-enrollment.\n- Check if the compromised account was used to access or alter any sensitive data or systems.\n- If a specific modification technique was used, ensure your systems are patched or configured to prevent such techniques.\n- Assess the criticality of affected services and servers.\n- Work with your IT team to minimize the impact on users and maintain business continuity.\n- If multiple accounts are affected, consider a broader reset or audit of MFA tokens.\n- Implement security best practices [outlined](https://www.okta.com/blog/2019/10/9-admin-best-practices-to-keep-your-org-secure/) by Okta.\n- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).", "query": "event.dataset:okta.system and event.action:policy.rule.update\n", "references": ["https://help.okta.com/en/prod/Content/Topics/Security/Security_Policies.htm", "https://developer.okta.com/docs/reference/api/system-log/", "https://developer.okta.com/docs/reference/api/event-types/", "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy"], "related_integrations": [{"package": "okta", "version": "^1.3.0"}], "required_fields": [{"ecs": true, "name": "event.action", "type": "keyword"}, {"ecs": true, "name": "event.dataset", "type": "keyword"}], "risk_score": 21, "rule_id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19", "setup": "The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.", "severity": "low", "tags": ["Use Case: Identity and Access Audit", "Data Source: Okta", "Use Case: Identity and Access Audit", "Tactic: Defense Evasion"], "threat": [{"framework": "MITRE ATT&CK", "tactic": {"id": "TA0005", "name": "Defense Evasion", "reference": "https://attack.mitre.org/tactics/TA0005/"}, "technique": [{"id": "T1562", "name": "Impair Defenses", "reference": "https://attack.mitre.org/techniques/T1562/", "subtechnique": [{"id": "T1562.007", "name": "Disable or Modify Cloud Firewall", "reference": "https://attack.mitre.org/techniques/T1562/007/"}]}]}], "timestamp_override": "event.ingested", "type": "query", "version": 104}, "id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19_104", "type": "security-rule"} |
1 change: 1 addition & 0 deletions
1
...urity_detection_engine/kibana/security_rule/000047bb-b27a-47ec-8b62-ef1a5d2c9e19_105.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
{"attributes": {"author": ["Elastic"], "description": "Detects attempts to modify a rule within an Okta policy. An adversary may attempt to modify an Okta policy rule in order to weaken an organization's security controls.", "false_positives": ["Consider adding exceptions to this rule to filter false positives if Okta MFA rules are regularly modified in your organization."], "index": ["filebeat-*", "logs-okta*"], "language": "kuery", "license": "Elastic License v2", "name": "Attempt to Modify an Okta Policy Rule", "note": "## Triage and analysis\n\n### Investigating Attempt to Modify an Okta Policy Rule\n\nThe modification of an Okta policy rule can be an indication of malicious activity as it may aim to weaken an organization's security controls.\n\n#### Possible investigation steps:\n\n- Identify the actor related to the alert by reviewing `okta.actor.id`, `okta.actor.type`, `okta.actor.alternate_id`, or `okta.actor.display_name` fields in the alert.\n- Review the `okta.client.user_agent.raw_user_agent` field to understand the device and software used by the actor.\n- Examine the `okta.outcome.reason` field for additional context around the modification attempt.\n- Check the `okta.outcome.result` field to confirm the rule modification attempt.\n- Check if there are multiple rule modification attempts from the same actor or IP address (`okta.client.ip`).\n- Check for successful logins immediately following the modification attempt.\n- Verify whether the actor's activity aligns with typical behavior or if any unusual activity took place around the time of the modification attempt.\n\n### False positive analysis:\n\n- Check if there were issues with the Okta system at the time of the modification attempt. This could indicate a system error rather than a genuine threat activity.\n- Check the geographical location (`okta.request.ip_chain.geographical_context`) and time of the modification attempt. If these match the actor's normal behavior, it might be a false positive.\n- Verify the actor's administrative rights to ensure they are correctly configured.\n\n### Response and remediation:\n\n- If unauthorized modification is confirmed, initiate the incident response process.\n- Immediately lock the affected actor account and require a password change.\n- Consider resetting MFA tokens for the actor and require re-enrollment.\n- Check if the compromised account was used to access or alter any sensitive data or systems.\n- If a specific modification technique was used, ensure your systems are patched or configured to prevent such techniques.\n- Assess the criticality of affected services and servers.\n- Work with your IT team to minimize the impact on users and maintain business continuity.\n- If multiple accounts are affected, consider a broader reset or audit of MFA tokens.\n- Implement security best practices [outlined](https://www.okta.com/blog/2019/10/9-admin-best-practices-to-keep-your-org-secure/) by Okta.\n- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).", "query": "event.dataset:okta.system and event.action:policy.rule.update\n", "references": ["https://help.okta.com/en/prod/Content/Topics/Security/Security_Policies.htm", "https://developer.okta.com/docs/reference/api/system-log/", "https://developer.okta.com/docs/reference/api/event-types/", "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy"], "related_integrations": [{"package": "okta", "version": "^1.3.0"}], "required_fields": [{"ecs": true, "name": "event.action", "type": "keyword"}, {"ecs": true, "name": "event.dataset", "type": "keyword"}], "risk_score": 21, "rule_id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19", "setup": "The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.", "severity": "low", "tags": ["Use Case: Identity and Access Audit", "Tactic: Defense Evasion", "Data Source: Okta"], "threat": [{"framework": "MITRE ATT&CK", "tactic": {"id": "TA0005", "name": "Defense Evasion", "reference": "https://attack.mitre.org/tactics/TA0005/"}, "technique": [{"id": "T1562", "name": "Impair Defenses", "reference": "https://attack.mitre.org/techniques/T1562/", "subtechnique": [{"id": "T1562.007", "name": "Disable or Modify Cloud Firewall", "reference": "https://attack.mitre.org/techniques/T1562/007/"}]}]}], "timestamp_override": "event.ingested", "type": "query", "version": 105}, "id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19_105", "type": "security-rule"} |
Oops, something went wrong.