-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(cloudtrail): add threat detection checks for AWS (enum and priv escalation) #3602
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## prowler-4.0-dev #3602 +/- ##
===================================================
- Coverage 86.09% 86.08% -0.02%
===================================================
Files 705 705
Lines 21851 21862 +11
===================================================
+ Hits 18813 18820 +7
- Misses 3038 3042 +4 ☔ View full report in Codecov by Sentry. |
You can check the documentation for this PR here -> SaaS Documentation |
You can check the documentation for this PR here -> SaaS Documentation |
You can check the documentation for this PR here -> SaaS Documentation |
You can check the documentation for this PR here -> SaaS Documentation |
You can check the documentation for this PR here -> SaaS Documentation |
You can check the documentation for this PR here -> SaaS Documentation |
You can check the documentation for this PR here -> SaaS Documentation |
docs/tutorials/configuration_file.md
Outdated
# aws.cloudtrail_threat_detection_privilege_escalation | ||
# aws.cloudtrail_threat_detection_enumeration | ||
threat_detection_entropy: 0.7 # 70% of actions found to decide if it is an attack event | ||
threat_detection_minutes: 1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
threat_detection_minutes: 1 | |
threat_detection_minutes: 1440 # 1 day to search back from now |
prowler/config/config.yaml
Outdated
# AWS CloudTrail Configuration | ||
# aws.cloudtrail_threat_detection_privilege_escalation | ||
threat_detection_privilege_escalation_entropy: 0.7 # Percentage of actions found to decide if it is an privilege_escalation attack event, by default is 0.7 (70%) | ||
threat_detection_privilege_escalation_minutes: 1440 # Past minutes to check for privilege_escalation attacks, by default is 1440 minutes (24 hours) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
threat_detection_privilege_escalation_minutes: 1440 # Past minutes to check for privilege_escalation attacks, by default is 1440 minutes (24 hours) | |
threat_detection_privilege_escalation_minutes: 1440 # Past minutes to search from now for privilege_escalation attacks, by default is 1440 minutes (24 hours) |
prowler/config/config.yaml
Outdated
] | ||
# aws.cloudtrail_threat_detection_enumeration | ||
threat_detection_enumeration_entropy: 0.7 # Percentage of actions found to decide if it is an enumeration attack event, by default is 0.7 (70%) | ||
threat_detection_enumeration_minutes: 1440 # Past minutes to check for enumeration attacks, by default is 1440 minutes (24 hours) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
threat_detection_enumeration_minutes: 1440 # Past minutes to check for enumeration attacks, by default is 1440 minutes (24 hours) | |
threat_detection_enumeration_minutes: 1440 # Past minutes to search from now for enumeration attacks, by default is 1440 minutes (24 hours) |
You can check the documentation for this PR here -> SaaS Documentation |
Description
Add 2 Threat Detection checks that only run if category is invoked directly. THESE DONT RUN WITH ALL CHECKS due to performance.
Runs these check only if
--category threat-detection
is set.I.e.:
prowler aws --category threat-detection
License
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.