Skip to content

Commit 7424c27

Browse files
Update indexes
1 parent 7629a82 commit 7424c27

File tree

3 files changed

+13
-1
lines changed

3 files changed

+13
-1
lines changed

indexes/alpha-index.md

+6
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,8 @@
122122
- [AWS Console Login](../rules/aws_cloudtrail_rules/aws_console_login.yml)
123123
- [AWS Console Sign-In NOT PRECEDED BY Okta Redirect](../correlation_rules/aws_console_sign-in_without_okta.yml)
124124
- A user has logged into the AWS console without authenticating via Okta. This rule requires AWS SSO via Okta and both log sources configured.
125+
- [AWS Decrypt SSM Parameters](../rules/aws_cloudtrail_rules/aws_ssm_decrypt_ssm_params.yml)
126+
- Identify principles retrieving a high number of SSM Parameters of type 'SecretString'.
125127
- [AWS DNS Logs Deleted](../rules/aws_cloudtrail_rules/aws_dns_logs_deleted.yml)
126128
- Detects when logs for a DNS Resolver have been removed.
127129
- [AWS EC2 Discovery Commands Executed](../queries/aws_queries/ec2_discovery_commands_query.yml)
@@ -187,6 +189,10 @@
187189
- An AWS storage snapshot was made public.
188190
- [AWS Software Discovery](../rules/aws_cloudtrail_rules/aws_software_discovery.yml)
189191
- A user is obtaining a list of security software, configurations, defensive tools, and sensors that are in AWS.
192+
- [AWS SSM Distributed Command](../rules/aws_cloudtrail_rules/aws_ssm_distributed_command.yml)
193+
- Detect an attacker utilizing AWS Systems Manager (SSM) to execute commands through SendCommand on multiple EC2 instances.
194+
- [AWS SSM Multiple Sessions](../queries/aws_queries/aws_ssm_multiple_sessions_query.yml)
195+
- Returns StartSession events by users who triggered more than 2 StartSession events over the past hour.
190196
- [AWS SSO Access Token Retrieved by Unauthenticated IP](../correlation_rules/aws_sso_access_token_retrieved_by_unauthenticated_ip.yml)
191197
- When using AWS in an enterprise environment, best practices dictate to use a single sign-on service for identity and access management. AWS SSO is a popular solution, integrating with third-party providers such as Okta and allowing to centrally manage roles and permissions in multiple AWS accounts.In this post, we demonstrate that AWS SSO is vulnerable by design to device code authentication phishing – just like any identity provider implementing OpenID Connect device code authentication. This technique was first demonstrated by Dr. Nestori Syynimaa for Azure AD. The feature provides a powerful phishing vector for attackers, rendering ineffective controls such as MFA (including Yubikeys) or IP allow-listing at the IdP level.
192198
- [AWS Trusted IPSet Modified](../rules/aws_cloudtrail_rules/aws_ipset_modified.yml)

indexes/aws.md

+6
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,8 @@
7676
- [AWS Console Login](../rules/aws_cloudtrail_rules/aws_console_login.yml)
7777
- [AWS Console Sign-In NOT PRECEDED BY Okta Redirect](../correlation_rules/aws_console_sign-in_without_okta.yml)
7878
- A user has logged into the AWS console without authenticating via Okta. This rule requires AWS SSO via Okta and both log sources configured.
79+
- [AWS Decrypt SSM Parameters](../rules/aws_cloudtrail_rules/aws_ssm_decrypt_ssm_params.yml)
80+
- Identify principles retrieving a high number of SSM Parameters of type 'SecretString'.
7981
- [AWS DNS Logs Deleted](../rules/aws_cloudtrail_rules/aws_dns_logs_deleted.yml)
8082
- Detects when logs for a DNS Resolver have been removed.
8183
- [AWS EC2 Discovery Commands Executed](../queries/aws_queries/ec2_discovery_commands_query.yml)
@@ -141,6 +143,10 @@
141143
- An AWS storage snapshot was made public.
142144
- [AWS Software Discovery](../rules/aws_cloudtrail_rules/aws_software_discovery.yml)
143145
- A user is obtaining a list of security software, configurations, defensive tools, and sensors that are in AWS.
146+
- [AWS SSM Distributed Command](../rules/aws_cloudtrail_rules/aws_ssm_distributed_command.yml)
147+
- Detect an attacker utilizing AWS Systems Manager (SSM) to execute commands through SendCommand on multiple EC2 instances.
148+
- [AWS SSM Multiple Sessions](../queries/aws_queries/aws_ssm_multiple_sessions_query.yml)
149+
- Returns StartSession events by users who triggered more than 2 StartSession events over the past hour.
144150
- [AWS SSO Access Token Retrieved by Unauthenticated IP](../correlation_rules/aws_sso_access_token_retrieved_by_unauthenticated_ip.yml)
145151
- When using AWS in an enterprise environment, best practices dictate to use a single sign-on service for identity and access management. AWS SSO is a popular solution, integrating with third-party providers such as Okta and allowing to centrally manage roles and permissions in multiple AWS accounts.In this post, we demonstrate that AWS SSO is vulnerable by design to device code authentication phishing – just like any identity provider implementing OpenID Connect device code authentication. This technique was first demonstrated by Dr. Nestori Syynimaa for Azure AD. The feature provides a powerful phishing vector for attackers, rendering ineffective controls such as MFA (including Yubikeys) or IP allow-listing at the IdP level.
146152
- [AWS Trusted IPSet Modified](../rules/aws_cloudtrail_rules/aws_ipset_modified.yml)

indexes/detection-coverage.json

+1-1
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)