CloudGuard Intelligence Updates
- 1 November 11 2024
- 2 November 04 2024
- 3 October 16 2024
- 4 October 07 2024
- 5 September 30 2024
- 6 September 16 2024
- 7 September 05 2024
- 8 August 11 2024
- 9 August 06 2024
- 10 July 24 2024
- 11 July 04 2024
- 12 June 24 2024
- 13 June 18 2024
- 14 June 17 2024
- 15 June 06 2024
- 16 May 27 2024
- 17 May 26 2024
- 18 May 21 2024
- 19 April 18 2024
- 20 April 02 2024
- 21 February 14 2024
- 22 July 03 2023
- 23 June 18 2023
- 24 May 28 2023
- 25 April 23 2023
- 26 March 30 2023
- 27 March 29 2023
- 28 March 20 2023
- 29 March 05 2023
- 30 February 19 2023
- 31 February 05 2023
- 32 January 22 2023
- 33 January 16 2023
- 34 January 15 2023
- 35 December 25 2022
- 36 December 11 2022
- 37 November 28 2022
- 38 November 13 2022
- 39 November 07 2022
- 40 November 06 2022
- 41 October 30 2022
November 11 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | Crypto mining terms have been identified | Modification |
|
|
| D9.AWS.502.75889 |
|
November 04 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | AWS Outbound Traffic from DB Ports to Internet Destination | Modification |
|
|
| D9.AWS.106.00673 |
| |
Medium | AWS Outbound Response from Server Remote Access Port to Malicious IP Address | Modification |
|
|
| D9.AWS.502.62800 |
| |
Critical | AWS Outbound Communication from Server DB Port to Malicious IP Address | Modification |
|
|
| D9.AWS.502.54494 |
| |
Critical | AWS Outbound Communication from Server Filesharing Port to Malicious IP Address | Modification |
|
|
| D9.AWS.502.41540 |
| |
Critical | AWS Outbound Communication from Server Remote Access Port to Malicious IP Address | Modification |
|
|
| D9.AWS.502.95086 |
| |
Low | AWS Outbound Response from Server DB Port to Malicious IP Address | Modification |
|
|
| D9.AWS.502.62133 |
| |
Informational | AWS Outbound Response from Server Network Port to Malicious IP Address | Modification |
|
|
| D9.AWS.502.82906 |
| |
Low | AWS Outbound Response from Server Filesharing Port to Malicious IP Address | Modification |
|
|
| D9.AWS.502.86161 |
| |
High | AWS Inbound Accepted Traffic from Malicious IP Address | Modification |
|
|
| D9.AWS.107.1929 |
| |
Low | AWS Outbound Traffic Suspected as Cryptomining Activity | Modification |
|
|
| D9.AWS.108.98731 |
| |
High | AWS Outbound Traffic from VPC to Internet Destination using RDP | Modification |
|
|
| D9.AWS.107.09562 |
| |
High | AWS Outbound Traffic from VPC to Internet Destination using SMB | Modification |
|
|
| D9.AWS.107.22364 |
| |
Low | AWS Outbound Traffic to Compromised Server | Modification |
|
|
| D9.AWS.107.44344 |
| |
Low | Abuse of Unsuccessful AssumeRole | Modification |
|
|
| D9.ALI.702.19961 |
| |
Critical | AWS Outbound Traffic to TOR Exit Node | Modification |
|
|
| D9.AWS.107.02305 |
| |
High | AWS Suspicious Outbound Traffic to Suspected CnC Server | Modification |
|
|
| D9.AWS.107.04785 |
| |
Informational | AWS Security Group Modification | Modification |
|
|
| D9.AWS.101.50079 |
| |
Low | AWS Suspicious Outbound Traffic to Phishing Server | Modification |
|
|
| D9.AWS.101.97471 |
| |
Low | AdministratorAccess Permissions were attached to a Role | Modification |
|
|
| D9.ALI.702.06360 |
| |
Low | A User Was Added to an Admin Group | Modification |
|
|
| D9.AWS.0.28676 |
| |
Medium | A Policy with IAM CRUD(CreateReadUpdateDelete) Permissions Was Attached to an IAM Identity | Modification |
|
|
| D9.AWS.0.71403 |
| |
Medium | A Policy With S3 CRUD(CreateReadUpdateDelete) Permissions Was Attached to an IAM Identity | Modification |
|
|
| D9.AWS.0.38420 |
| |
Low | App Role Assigned to Service Principals or Users or Groups | Modification |
|
|
| D9.AZU.512.40041 |
| |
High | Auto Scale Instance Disabled | Modification |
|
|
| D9.AZU.512.82136 |
| |
Medium | Azure Credentials Were Added to an Azure AD Service Principal | Modification |
|
|
| D9.AZU.512.35494 |
| |
Low | An Existing IAM Policy Version Was Set to Default | Modification |
|
|
| D9.AWS.0.23097 |
| |
Informational | Attachment of User or Group or Role Policy | Modification |
|
|
| D9.AWS.0.17234 |
| |
Medium | Access Key Status Changed to Active or Inactive | Modification |
|
|
| D9.AWS.0.35359 |
| |
Low | AdministratorAccess Permissions Attached to a Role | Modification |
|
|
| D9.AWS.102.06361 |
| |
Low | Access Key Created | Modification |
|
|
| D9.AWS.104.71471 |
| |
Low | AdministratorAccess Permissions Attached to a User | Modification |
|
|
| D9.AWS.0.49438 |
| |
Critical | Azure Outbound Communication from Server DB Port to Malicious IP Address | Modification |
|
|
| D9.AZU.512.64183 |
| |
High | Azure Inbound Accepted Traffic from Malicious IP Address | Modification |
|
|
| D9.AZU.107.71929 |
| |
Critical | Azure Outbound Communication from Server Filesharing Port to Malicious IP Address | Modification |
|
|
| D9.AZU.512.86610 |
| |
Critical | Azure Outbound Communication from Server Remote Access Port to Malicious IP Address | Modification |
|
|
| D9.AZU.512.68557 |
| |
Low | Azure Outbound Response from Server DB Port to Malicious IP Address | Modification |
|
|
| D9.AZU.512.25894 |
| |
Low | Azure Outbound Response from Server Filesharing Port to Malicious IP Address | Modification |
|
|
| D9.AZU.512.25639 |
| |
Low | Azure Outbound Response from Server Remote Access Port to Malicious IP Address | Modification |
|
|
| D9.AZU.512.67901 |
| |
Low | Azure Outbound Traffic to Compromised Server | Modification |
|
|
| D9.AZU.512.42349 |
| |
Informational | Azure Outbound Traffic to Malicious IP Addresses | Modification |
|
|
| D9.AZU.512.86161 |
| |
Informational | CodeCommit GitPull Request | Modification |
|
|
| D9.AWS.502.29977 |
| |
Informational | Azure Security Group Modification | Modification |
|
|
| D9.AZU.512.93662 |
| |
High | Azure Outbound Traffic from VPC to Internet Destination using RDP | Modification |
|
|
| D9.AZU.512.09562 |
| |
Informational | Discovery operation using multiple Describe or List APIs | Modification |
|
|
| D9.AWS.502.28997 |
| |
High | GCP Inbound Accepted Traffic from Malicious IP Address | Modification |
|
|
| D9.GCP.515.44354 |
| |
Critical | Azure Outbound Traffic to TOR Exit Node | Modification |
|
|
| D9.AZU.101.02305 |
| |
Medium | External DescribeVpcs Request | Modification |
|
|
| D9.AWS.502.49684 |
| |
High | Inbound Accepted Traffic to Kubernetes Cluster from Malicious IP Address | Modification |
|
|
| D9.K8S.107.71929 |
| |
High | GCP Outbound Traffic from VPC to Internet Destination using RDP | Modification |
|
|
| D9.GCP.515.45774 |
| |
Critical | GCP Outbound Traffic to Malicious IP Addresses | Modification |
|
|
| D9.GCP.515.40828 |
| |
Critical | GCP Outbound Traffic to TOR Exit Node | Modification |
|
|
| D9.GCP.515.47515 |
| |
Medium | K8S SSH Access to Nodes from Pods | Modification |
|
|
| D9.AWS.108.97652 |
| |
Critical | EC2 AMI is made public in AWS | Modification |
|
|
| D9.AWS.100.57034 |
| |
Critical | Outbound Kubernetes Traffic to Malicious IP Addresses | Modification |
|
|
| D9.K8S.522.86159 |
| |
High | Outbound Traffic to Internet Destination from DB Ports within Kubernetes Cluster | Modification |
|
|
| D9.K8S.106.00673 |
| |
Medium | Outbound Traffic from Kubernetes Cluster to Internet Destination Using SSH | Modification |
|
|
| D9.K8S.522.83805 |
| |
High | Brute-force Attack on an S3 Bucket | Modification |
|
|
| D9.AWS.108.49195 |
| |
Critical | Outbound Traffic to TOR Exit Node from within Kubernetes Cluster | Modification |
|
|
| D9.K8S.522.02305 |
| |
Low | IAM Permissions Enumeration | Modification |
|
|
| D9.AWS.105.66271 |
| |
Informational | Function Created | Modification |
|
|
| D9.AZU.512.14996 |
| |
Medium | Lambda DoS | Modification |
|
|
| D9.AWS.108.32796 |
| |
Medium | Lambda Layer Was Added From an External Account | Modification |
|
|
| D9.AWS.107.92598 |
| |
Medium | IAM Policy Allowing Privilege Escalation via EC2 Service | Modification |
|
|
| D9.AWS.102.25662 |
| |
Low | Large Number of Failed Logins to Azure | Modification |
|
|
| D9.AZU.512.56100 |
| |
Medium | Ping Sweep Activity | Modification |
|
|
| D9.AWS.105.87086 |
| |
Medium | Overly-Permissive Policy Attached to an SES Identity | Modification |
|
|
| D9.AWS.108.27256 |
| |
Low | Password Policy Change | Modification |
|
|
| D9.AWS.108.42542 |
| |
Medium | Overly-Permissive SQS Policy | Modification |
|
|
| D9.AWS.108.88304 |
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
| D9.GCP.515.48951 |
| |
Medium | Overly-Permissive Lambda Permission | Modification |
|
|
| D9.AWS.108.80248 |
| |
Informational | Port Scanning from the Internet | Modification |
|
|
| D9.AWS.502.49424 |
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
| D9.AZU.512.17551 |
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
| D9.AWS.105.7551 |
| |
High | Port Scan of Internal Asset From ECS | Modification |
|
|
| D9.AWS.105.54069 |
| |
Low | S3 Bucket Object Collection Pattern | Modification |
|
|
| D9.AWS.502.81184 |
| |
High | RDS Instance Password Changed | Modification |
|
|
| D9.AWS.0.88439 |
| |
Low | S3 Objects Deleted | Modification |
|
|
| D9.AWS.108.93965 |
| |
Informational | Role Disassociated from Instance | Modification |
|
|
| D9.AWS.0.11261 |
| |
High | RDS Instance Publicly Accessible | Modification |
|
|
| D9.AWS.108.67850 |
| |
Low | S3 Bucket Configurations Deleted | Modification |
|
|
| D9.AWS.0.90316 |
| |
Medium | S3 Bucket Versioning Suspended | Modification |
|
|
| D9.AWS.108.26846 |
| |
Low | Several Failed Logins Attempts Followed by a Successful Login to Your AWS Console | Modification |
|
|
| D9.AWS.104.18467 |
| |
Critical | Successful API Request Originated From a Tor Exit Node | Modification |
|
|
| D9.AWS.108.44333 |
| |
Low | Successful Console Logins From More Than One User-Agent | Modification |
|
|
| D9.AWS.104.70939 |
| |
Low | Suspicious DNS Packet Size | Modification |
|
|
| D9.GCP.515.54560 |
| |
Low | Suspicious DNS Packets Volume Per Session | Modification |
|
|
| D9.GCP.515.80600 |
| |
Low | Suspicious NTP Packet Size | Modification |
|
|
| D9.GCP.515.61003 |
| |
Low | Suspicious DNS Packet Size | Modification |
|
|
| D9.AWS.107.09957 |
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
| D9.GCP.515.97764 |
| |
Critical | Unauthorized actions under tenant scope | Modification |
|
|
| D9.AZU.512.23090 |
| |
Low | Suspicious DNS Packets Volume Per Session | Modification |
|
|
| D9.AWS.107.37118 |
| |
High | Suspicious StartSession Event Was Triggered | Modification |
|
|
| D9.AWS.108.25508 |
| |
Low | Suspicious NTP Packet Size | Modification |
|
|
| D9.AWS.107.31878 |
| |
High | Temporary Credentials Created From Permanent User | Modification |
|
|
| D9.AWS.103.40436 |
| |
High | Unsecured Task Definition Created - hostPath | Modification |
|
|
| D9.AWS.108.63748 |
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
| D9.AWS.107.65125 |
| |
Low | Suspicious NTP Packet Size | Modification |
|
|
| D9.AZU.107.31878 |
| |
High | Unsecured Task Definition Created - Dangerous Capabilities | Modification |
|
|
| D9.AWS.108.54497 |
|
October 16 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | Crypto mining terms have been identified | Modification |
|
|
| D9.AWS.502.75889 |
|
October 07 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Medium | S3 Bucket Server Access Logs Disabled | New |
|
|
| D9.AWS.103.87181 |
| |
Informational | CloudFront Function Created | New |
|
|
| D9.AWS.105.25835 |
| |
Critical | EC2 AMI is made public in AWS. | New |
|
|
| D9.AWS.100.57034 |
| |
High | Anomalous Login to the Microsoft Entra Connect Synchronization Account | Modification |
|
|
| D9.AZU.512.43406 |
|
September 30 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | Exploiting elevated user access Administrator role | Modification |
|
|
| D9.AZU.512.56418 |
|
September 16 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | Multitenant Access Configured for Azure App | Modification |
|
|
| D9.AZU.512.95565 |
| |
High | Admin Permissions Granted to AKS Cluster Service Account | Modification |
|
|
| D9.AZU.512.93543 |
|
September 05 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | User Assigned as Subscription Owner | New |
|
|
| D9.AZU.512.63813 |
| |
High | Multitenant Access Configured for Azure App | New |
|
|
| D9.AZU.512.95565 |
| |
High | Admin Permissions Granted to AKS Cluster Service Account | New |
|
|
| D9.AZU.512.93543 |
| |
None | Medium | General Guard Duty Rule | Removal |
|
|
| None |
|
August 11 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | EXPLOITING ELEVATED USER ACCESS ADMINISTRATOR ROLE | Modification |
|
|
| D9.AZU.512.56418 |
|
August 06 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | Azure Firewall Rules Changed | New |
|
|
| D9.AZU.512.87013 |
| |
Low | Azure Active Directory PowerShell Sign-In | New |
|
|
| D9.AZU.512.65751 |
| |
High | S3 ACL Enumeration Attack | New |
|
|
| D9.AWS.502.48632 |
| |
Low | Write Permissions Added to Service Principal | New |
|
|
| D9.AZU.512.59482 |
|
July 24 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Critical | Suspicious Automation Tool Detected | Modification |
|
|
| D9.AZU.512.73899 |
|
July 04 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Low | Azure Outbound Response from an internal server file sharing port to a malicious IP | Modification |
|
|
| D9.AZU.512.25639 |
| |
Low | Azure Outbound Response from a Server DB port to a malicious IP | Modification |
|
|
| D9.AZU.512.25894 |
| |
Critical | Azure Outbound communication from a Server DB port to a malicious IP | Modification |
|
|
| D9.AZU.512.64183 |
| |
Low | Outbound Traffic to a Compromised Server | Modification |
|
|
| D9.AZU.512.42349 |
| |
Critical | Azure Outbound communication from an internal server file sharing port to a malicious IP | Modification |
|
|
| D9.AZU.512.86610 |
| |
Informational | Azure General Outbound Traffic to a malicious IP | Modification |
|
|
| D9.AZU.512.86161 |
| |
Low | Azure Outbound Response from internal server remote access port to a malicious IP | Modification |
|
|
| D9.AZU.512.67901 |
| |
Critical | Azure Outbound communication from internal server remote access port to a malicious IP | Modification |
|
|
| D9.AZU.512.68557 |
|
June 24 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Informational | Azure Compute SSH Key pair Generated | New |
|
|
| D9.AZU.512.78077 |
| |
Low | Azure File Share modified. | New |
|
|
| D9.AZU.512.91020 |
| |
Informational | AZU General Outbound Traffic to a malicious IP | Modification |
|
|
| D9.AZU.512.86161 |
| |
Low | Azure Firewall Deleted | New |
|
|
| D9.AZU.512.12198 |
| |
Informational | Azure Compute SSH Key pair deleted | New |
|
|
| D9.AZU.512.51624 |
| |
Informational | Outbound Response from a Server Network Port to a Malicious IP | Modification |
|
|
| D9.AWS.502.82906 |
| |
Critical | Azure Network Watcher was created or modified | New |
|
|
| D9.AZU.512.21549 |
| |
Critical | Outbound Communication from a Server Remote Access Port to a Malicious IP | Modification |
|
|
| D9.AWS.502.95086 |
| |
Low | Azure managed disks snapshots were modified. | New |
|
|
| D9.AZU.512.47677 |
| |
Low | Azure Service Principal added | New |
|
|
| D9.AZU.512.15433 |
| |
Medium | Outbound Response from a Server Remote Access Port to a Malicious IP | Modification |
|
|
| D9.AWS.502.62800 |
| |
D9.AWS.502.89983 | Critical | Outbound Communication from a Server Network Port to a Malicious IP | Removal |
|
|
| D9.AWS.502.89983 |
|
June 18 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Critical | Suspicious Automation Tool Detected | New |
|
|
| D9.AZU.512.73899 |
| |
Low | Outbound Traffic to a Compromised Server | New |
|
|
| D9.AZU.512.42349 |
|
June 17 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Critical | AZU General Outbound Traffic to a malicious IP | New |
|
|
| D9.AZU.512.86161 |
| |
Low | AZU Outbound Response from a Server DB port to a malicious IP | New |
|
|
| D9.AZU.512.25894 |
| |
Low | AZU Outbound Response from internal server remote access port to a malicious IP | New |
|
|
| D9.AZU.512.67901 |
| |
Low | AZU Outbound Response from an internal server file sharing port to a malicious IP | New |
|
|
| D9.AZU.512.25639 |
| |
Critical | AZU Outbound communication from a Server DB port to a malicious IP | New |
|
|
| D9.AZU.512.64183 |
| |
Critical | AZU Outbound communication from an internal server file sharing port to a malicious IP | New |
|
|
| D9.AZU.512.86610 |
| |
Critical | AZU Outbound communication from internal server remote access port to a malicious IP | New |
|
|
| D9.AZU.512.68557 |
| |
Critical | Outbound Communication from a Server File-sharing Port to a Malicious IP | New |
|
|
| D9.AWS.502.41540 |
| |
Critical | Outbound Communication from a Server DB Port to a Malicious IP | New |
|
|
| D9.AWS.502.54494 |
| |
Critical | Outbound Communication from a Server Network Port to a Malicious IP | New |
|
|
| D9.AWS.502.89983 |
| |
Critical | Outbound Communication from a Server Remote Access Port to a Malicious IP | New |
|
|
| D9.AWS.502.95086 |
| |
Medium | Outbound Response from a Server Remote Access Port to a Malicious IP | New |
|
|
| D9.AWS.502.62800 |
| |
Low | Outbound Response from a Server File-sharing Port to a Malicious IP | New |
|
|
| D9.AWS.502.86161 |
| |
Low | Outbound Response from a Server Network Port to a Malicious IP | New |
|
|
| D9.AWS.502.82906 |
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
| D9.AWS.105.7551 |
| |
Low | Outbound Response from a Server DB Port to a Malicious IP | New |
|
|
| D9.AWS.502.62133 |
| |
D9.AWS.107.86159 | Critical | Outbound Traffic to Malicious IP Addresses | Removal |
|
|
| D9.AWS.107.86159 |
|
D9.AZU.107.86159 | Critical | Outbound Traffic to Malicious IP Addresses | Removal |
|
|
| D9.AZU.107.86159 |
|
June 06 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Medium | A Microsoft Entra Custom Role Was Created with Owner Permissions | New |
|
|
| D9.AZU.512.97932 |
| |
Informational | Admin permissions attached to a User | New |
|
|
| D9.AZU.512.38978 |
| |
Informational | New User Created | New |
|
|
| D9.AZU.512.23181 |
| |
Low | A Role Has Been Updated | New |
|
|
| D9.AZU.512.55860 |
| |
Informational | Admin permissions attached to a Group | New |
|
|
| D9.AZU.512.80236 |
| |
Low | An Azure custom role was created with permissions to Active Directory | New |
|
|
| D9.AZU.512.60844 |
| |
Low | An Azure custom role was created with full action permissions | New |
|
|
| D9.AZU.512.64788 |
| |
Informational | SQL database Transparent Data Encryption Modified | New |
|
|
| D9.AZU.512.39261 |
| |
Informational | Blob Versioning were Disabled | New |
|
|
| D9.AZU.512.56218 |
| |
Medium | Company settings were modified | New |
|
|
| D9.AZU.512.94460 |
| |
Informational | Network Security Groups were created or updated | New |
|
|
| D9.AZU.512.47901 |
| |
Low | Security info was changed | New |
|
|
| D9.AZU.512.84822 |
| |
Informational | Security Group rule Modification | New |
|
|
| D9.AZU.512.93662 |
| |
Informational | Network Security Groups were deleted | New |
|
|
| D9.AZU.512.46481 |
| |
Informational | User Added to a Group | New |
|
|
| D9.AZU.512.54312 |
| |
Informational | User Login Profile Updated | New |
|
|
| D9.AZU.512.21188 |
| |
Informational | Azure Virtual Network was Created or Modified. | New |
|
|
| D9.AZU.512.78321 |
| |
Low | Azure Virtual Network Deleted. | New |
|
|
| D9.AZU.512.61204 |
|
May 27 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Low | Security info was changed | New |
|
|
| D9.AZU.512.84822 |
| |
Low | Security info Deleted | New |
|
|
| D9.AZU.512.21983 |
| |
Medium | User cancelled security info registration | New |
|
|
| D9.AZU.512.37384 |
| |
High | Admin deleted security info | New |
|
|
| D9.AZU.512.20609 |
| |
Medium | Admin updated security info | New |
|
|
| D9.AZU.512.85015 |
|
May 26 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Low | Create or Update Virtual Network Subnet | New |
|
|
| D9.AZU.512.52853 |
| |
High | Auto Scale Instance Disabled | New |
|
|
| D9.AZU.512.82136 |
| |
Low | Azure File Share deleted | New |
|
|
| D9.AZU.512.77122 |
| |
Medium | AKS Cluster Deleted | New |
|
|
| D9.AZU.512.13719 |
| |
Medium | Create or Update Virtual Machine | New |
|
|
| D9.AZU.512.99000 |
| |
Low | NAT Gateway Created or Updates | New |
|
|
| D9.AZU.512.31736 |
| |
High | Network Firewall Diagnostic Setting Modified | New |
|
|
| D9.AZU.512.50301 |
| |
Low | A Container App Instance Has Been Updated | New |
|
|
| D9.AZU.512.50341 |
|
May 21 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Critical | Conditional Access Policy Deletion | New |
|
|
| D9.AZU.512.60724 |
| |
Medium | Conditional Access Policy Modification | New |
|
|
| D9.AZU.512.16512 |
|
April 18 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
High | Azure SUPERMAN Login | Modification |
|
|
| D9.AZU.512.21827 |
|
April 02 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Critical | Active Directory high-privileged role assigned to non-user entity | New |
|
|
| D9.AZU.512.15964 |
| |
High | Elevated Azure Graph API permissions granted | New |
|
|
| D9.AZU.512.96515 |
| |
Critical | Unauthorized actions under tenant’s scope | New |
|
|
| D9.AZU.512.23090 |
| |
High | Exploiting elevated user access administrator role | New |
|
|
| D9.AZU.512.56418 |
|
February 14 2024
GSL ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Rule ID | Affected Rulesets |
---|---|---|---|---|---|---|---|---|
Medium | Outbound Traffic From a Kubernetes Cluster to Internet Destination Using SSH | Modification |
|
|
| D9.K8S.522.83805 |
| |
Medium | Outbound Traffic to a Compromised Server From a Kubernetes Cluster | Modification |
|
|
| D9.K8S.522.44344 |
| |
D9.AWS.108.75279 | Informational | EKS Cluster Deleted | Removal |
|
|
| D9.AWS.108.75279 |
|
D9.AWS.108.02076 | Medium | Lack of Service Account Usage in Kubernetes Node | Removal |
|
|
| D9.AWS.108.02076 |
|
D9.AWS.108.12930 | Low | EKS Cluster Control Plane Logs Disabled | Removal |
|
|
| D9.AWS.108.12930 |
|
D9.AWS.108.88809 | Informational | Fargate Profile Created For Cluster | Removal |
|
|
| D9.AWS.108.88809 |
|
July 03 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Medium | Shared EBS Snapshot Was Copied by another AWS Account | Modification |
|
|
|
|
June 18 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Low | Abuse of unsuccessful AssumeRole | Modification |
|
|
|
|
May 28 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Informational | Discovery operation using multiple Describe / List APIs | Modification |
|
|
|
|
April 23 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
High | Access key used from multiple IPs | Modification |
|
|
|
|
March 30 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Medium | MFA failed attempts | Modification |
|
|
|
| |
Low | S3 Bucket Object Collection Pattern | Modification |
|
|
|
|
March 29 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Informational | The trust policy of a role was modified to allow third party access | New |
|
|
|
| |
Informational | CodeCommit GitPull Request | New |
|
|
|
| |
Medium | MFA failed attempts | New |
|
|
|
| |
High | Malicious Source Address Detected in SES or SNS | New |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
| |
High | S3 Bucket Object Collection Pattern | New |
|
|
|
|
March 20 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Medium | External DescribeVpcs Request | New |
|
|
|
| |
Medium | Multiple Describe APIs Detected | New |
|
|
|
|
March 05 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Informational | Account Password Policy Discovery | New |
|
|
|
| |
Informational | Attach Role to Key Vault | New |
|
|
|
| |
Informational | Failed Login Attempts to Your AZURE Console Using an Invalid Username or Password | New |
|
|
|
| |
Informational | Security Group Modification | Modification |
|
|
|
| |
Low | Storage account key regenerate | New |
|
|
|
| |
Critical | VPC Traffic Mirroring Session Created | New |
|
|
|
|
February 19 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Informational | GuardDuty Disabled | Modification |
|
|
|
| |
High | A Command Was Sent to All Managed Instances | Modification |
|
|
|
| |
Low | A Container Has Been Stopped Due to Absence of an Attached Foreground Process | Modification |
|
|
|
| |
Low | A Container Has Been Stopped Due to SIGKILL | Modification |
|
|
|
| |
Low | A Container Has Been Stopped Due to SIGSEGV | Modification |
|
|
|
| |
Low | A Container Has Been Stopped Due to SIGTERM | Modification |
|
|
|
| |
Low | A Container Has Been Stopped Due to Application Error or Incorrect Reference | Modification |
|
|
|
| |
Low | A New Overly-Permissive Policy Was Set to Default | Modification |
|
|
|
| |
Informational | Abuse of Role Credentials | Modification |
|
|
|
| |
Low | Abuse of Unsuccessful AssumeRole | Modification |
|
|
|
| |
Low | Abuse of unsuccessful AssumeRole | Modification |
|
|
|
| |
Low | Abuse of unsuccessful Role assignments | New |
|
|
|
| |
Medium | Administrator Permissions Attached to a Role | Modification |
|
|
|
| |
Low | Administrator Permissions Attached to a User | Modification |
|
|
|
| |
Low | AdministratorAccess Permissions Attached to a Role | Modification |
|
|
|
| |
Low | AdministratorAccess Permissions Attached to a User | Modification |
|
|
|
| |
Low | AdministratorAccess Permissions were attached to a Role | Modification |
|
|
|
| |
Medium | Policy Containing All Resources Attached to a Role | Modification |
|
|
|
| |
Medium | Policy Containing All Resources Attached to a User | Modification |
|
|
|
| |
High | IAM Policy Allowing Privilege Escalation via SSM Service | Modification |
|
|
|
| |
Low | An Existing IAM Policy Version Was Set to Default | Modification |
|
|
|
| |
Informational | An Image Was Pushed to a Repository | Modification |
|
|
|
| |
Critical | An S3 object is Publicly Accessible | Modification |
|
|
|
| |
Low | Azure App Role Assigned to Service Principals/Users/Groups | Modification |
|
|
|
| |
Informational | Attach Role to Instance | Modification |
|
|
|
| |
Informational | Attach Role to Virtual machine | New |
|
|
|
| |
Informational | Attachment of User/Group/Role Policy | Modification |
|
|
|
| |
High | Azure SUPERMAN Login | Modification |
|
|
|
| |
Medium | Same User Login Attempt From Multiple Sources in a Short Period | Modification |
|
|
|
| |
High | Brute-force Attack on an S3 Bucket | Modification |
|
|
|
| |
Medium | A Policy with IAM CRUD(CreateReadUpdateDelete) Permissions Was Attached to an IAM Identity | Modification |
|
|
|
| |
Informational | Ciem Trigger Event | Modification |
|
|
|
| |
High | Crypto mining terms have been identified | Modification |
|
|
|
| |
Low | EC2 created in multiple regions | Modification |
|
|
|
| |
Informational | Failed Login Attempts to Your AWS Console Using an Invalid Username | Modification |
|
|
|
| |
Medium | FullAccess Permissions Attached to a Role | Modification |
|
|
|
| |
Medium | FullAccess Permissions Attached to a User | Modification |
|
|
|
| |
Medium | Wide-Permissions Policy Attached to a Role | Modification |
|
|
|
| |
Medium | Wide-Permissions Policy Attached to a User | Modification |
|
|
|
| |
Low | Function Bindings Modified | Modification |
|
|
|
| |
Low | IAM Permissions Enumeration | Modification |
|
|
|
| |
High | Image Scanning Disabled For Repository | Modification |
|
|
|
| |
High | Inbound Accepted Traffic From a Malicious IP Address | Modification |
|
|
|
| |
High | Inbound Accepted Traffic From a Malicious IP Address | Modification |
|
|
|
| |
High | Inbound Accepted Traffic to a Kubernetes Cluster From a Malicious IP Address | Modification |
|
|
|
| |
High | Inbound Accepted Traffic From a Malicious IP Address | Modification |
|
|
|
| |
Low | Internal Rejected Traffic | Modification |
|
|
|
| |
Low | Internal Rejected Traffic | Modification |
|
|
|
| |
Medium | K8S SSH Access to Nodes From Pods | Modification |
|
|
|
| |
Informational | Key Vault has been created | New |
|
|
|
| |
Low | Large Number of Failed Logins to Azure | Modification |
|
|
|
| |
Low | Large Number of Failed Logins to AWS console | Modification |
|
|
|
| |
High | Login Attempt to Alibaba console From a Malicious IP Address | Modification |
|
|
|
| |
Low | Azure Login Attempt With 2 Different User-Agents in a Short Time | Modification |
|
|
|
| |
Low | Successful Console Logins From More Than One User-Agent | Modification |
|
|
|
| |
Informational | Multiple New Instances Launched in a Short Period by a Specific User | Modification |
|
|
|
| |
High | Outbound Traffic From DB Ports Within a Kubernetes Cluster to Internet Destination | Modification |
|
|
|
| |
High | Outbound Traffic From DB Ports to Internet Destination | Modification |
|
|
|
| |
High | Outbound Traffic From VPC to Internet Destination Using SMB | Modification |
|
|
|
| |
High | Outbound Traffic From VPC to Internet Destination Using RDP | Modification |
|
|
|
| |
High | Outbound Traffic From VPC to Internet Destination Using RDP | Modification |
|
|
|
| |
Low | Outbound Traffic Suspected as Cryptomining Activity | Modification |
|
|
|
| |
Critical | Outbound Traffic to Tor Exit Node | Modification |
|
|
|
| |
Critical | Outbound Traffic to Tor Exit Node | Modification |
|
|
|
| |
Critical | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Critical | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Critical | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Critical | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
High | Public S3 Bucket, Overly-Permissive Access Point Policy | Modification |
|
|
|
| |
High | Public S3 Bucket, Overly-Permissive Bucket Policy | Modification |
|
|
|
| |
Medium | Overly-Permissive IAM Policy Attached to a Role | Modification |
|
|
|
| |
Medium | Overly-Permissive IAM Policy Attached to a User | Modification |
|
|
|
| |
Medium | Overly-Permissive Lambda Permission | Modification |
|
|
|
| |
Medium | Overly-Permissive Trust Policy Attached to a Role | Modification |
|
|
|
| |
Medium | Overly-Permissive Policy Attached to an SES Identity | Modification |
|
|
|
| |
Medium | Overly-Permissive SNS Policy | Modification |
|
|
|
| |
Medium | Overly-Permissive SQS Policy | Modification |
|
|
|
| |
Low | Owner Added to a Group | New |
|
|
|
| |
Low | Owner Removed from a Group | New |
|
|
|
| |
Low | Password Policy Change | Modification |
|
|
|
| |
Informational | Permissions Modified For Blob | New |
|
|
|
| |
Informational | Permissions Modified For Storage account | New |
|
|
|
| |
Informational | Permissions Modified For Table | New |
|
|
|
| |
Medium | Permissions Scanning Attempt | Modification |
|
|
|
| |
Medium | Ping Sweep Activity From Within a Kubernetes Pod | Modification |
|
|
|
| |
Medium | Ping Sweep Activity | Modification |
|
|
|
| |
High | Port Scan of Internal Asset From ECS | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset From a Kubernetes Pod | Modification |
|
|
|
| |
Low | Privilege Escalation via Policy Version | Modification |
|
|
|
| |
High | RDS Instance Password Changed | Modification |
|
|
|
| |
High | RDS Instance Publicly Accessible | Modification |
|
|
|
| |
Informational | Role Detached from Virtual machine | New |
|
|
|
| |
Medium | Same User Login Attempt From Multiple Sources in a Short Period | Modification |
|
|
|
| |
High | Same User Login From Multiple Locations | Modification |
|
|
|
| |
Informational | Security Group Modification | Modification |
|
|
|
| |
High | Successful API Request Originated From a Suspicious User-Agent | Modification |
|
|
|
| |
Critical | Successful API Request Originated From a Malicious IP Address | Modification |
|
|
|
| |
Critical | Successful API Request Originated From a Malicious IP Address | Modification |
|
|
|
| |
High | Suspicious Command Was Sent to a Managed Instance | Modification |
|
|
|
| |
Low | Suspicious DNS Packet Size | Modification |
|
|
|
| |
Low | Suspicious DNS Packet Size | Modification |
|
|
|
| |
Low | Suspicious DNS Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious DNS Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious NTP Packet Size | Modification |
|
|
|
| |
Low | Suspicious NTP Packet Size From a Kubernetes Pod | Modification |
|
|
|
| |
Low | Suspicious NTP Packet Size | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume From a Kubernetes Pod | Modification |
|
|
|
| |
High | Suspicious StartSession Event Was Triggered | Modification |
|
|
|
| |
Low | Suspicious Outbound Traffic to a Phishing Server | Modification |
|
|
|
| |
High | Public S3 Bucket, Overly-Permissive ACL | Modification |
|
|
|
| |
High | Unsecured PassRole Permission Was Applied to a Role | Modification |
|
|
|
| |
High | Unsecured PassRole Permission Was Applied to a User | Modification |
|
|
|
| |
High | Unsecured Repository Created | Modification |
|
|
|
| |
High | Unsecured Task Definition Created - Privileged Container | Modification |
|
|
|
| |
High | Unsecured Task Definition Created - hostPath | Modification |
|
|
|
| |
High | Unsecured Task Definition Created - Env Var and Command | Modification |
|
|
|
| |
Informational | User Data has been modified | Modification |
|
|
|
|
February 05 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Medium | Azure Admin Consent Was Launched | Modification |
|
|
|
| |
Medium | Policy Containing All Resources Attached to a Role | Modification |
|
|
|
| |
Critical | An S3 object is Publicly Accessible | Modification |
|
|
|
| |
Low | Azure App Role Assigned to Service Principals/Users/Groups | Modification |
|
|
|
| |
Medium | Same User Login Attempt From Multiple Sources in a Short Period | Modification |
|
|
|
| |
Medium | Credentials Were Added to an Azure AD Application | Modification |
|
|
|
| |
Medium | Azure Credentials Were Added to an Azure AD Service Principal | Modification |
|
|
|
| |
Medium | FullAccess Permissions Attached to a Role | Modification |
|
|
|
| |
Medium | FullAccess Permissions Attached to a User | Modification |
|
|
|
| |
High | Inbound Accepted Traffic to a Kubernetes Cluster From a Malicious IP Address | Modification |
|
|
|
| |
Medium | K8S Pod Access to Metadata | Modification |
|
|
|
| |
High | Access key used from multiple IPs | New |
|
|
|
| |
Low | Outbound Traffic to a Compromised Server From a Kubernetes Cluster | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
|
| |
High | Suspicious EC2 Instance Without KeyPair Was Launched | Removal |
|
|
|
|
January 22 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Low | A New Overly-Permissive Policy Was Set to Default | Modification |
|
|
|
| |
Low | Abuse of unsuccessful AssumeRole | Modification |
|
|
|
| |
Low | Policy Containing All Resources Attached to a Role | Modification |
|
|
|
| |
Medium | Policy Containing All Resources Attached to a User | Modification |
|
|
|
| |
High | An S3 object is Publicly Accessible | Modification |
|
|
|
| |
Medium | FullAccess Permissions Attached to a Role | Modification |
|
|
|
| |
Medium | FullAccess Permissions Attached to a User | Modification |
|
|
|
| |
Medium | Wide-Permissions Policy Attached to a Role | Modification |
|
|
|
| |
Medium | Wide-Permissions Policy Attached to a User | Modification |
|
|
|
| |
Low | Lambda Function Code Was Updated by an Entity Which Assumed a Role | Modification |
|
|
|
| |
High | Public S3 Bucket, Overly-Permissive Access Point Policy | Modification |
|
|
|
| |
High | Public S3 Bucket, Overly-Permissive Bucket Policy | Modification |
|
|
|
| |
Medium | Overly-Permissive IAM Policy Attached to a Role | Modification |
|
|
|
| |
Medium | Overly-Permissive IAM Policy Attached to a User | Modification |
|
|
|
| |
Medium | Overly-Permissive Lambda Permission | Modification |
|
|
|
| |
Medium | Overly-Permissive Trust Policy Attached to a Role | Modification |
|
|
|
| |
Medium | Overly-Permissive Policy Attached to an SES Identity | Modification |
|
|
|
| |
Medium | Overly-Permissive SQS Policy | Modification |
|
|
|
| |
Informational | Port Scanning from the Internet | New |
|
|
|
| |
High | Public S3 Bucket, Overly-Permissive ACL | Modification |
|
|
|
| |
High | Unsecured PassRole Permission Was Applied to a User | Modification |
|
|
|
|
January 16 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Low | A Task on ECS Has Stopped Unexpectedly | Modification |
|
|
|
| |
Low | Abuse of Unsuccessful AssumeRole | Modification |
|
|
|
| |
Low | Abuse of unsuccessful AssumeRole | Modification |
|
|
|
| |
Low | AdministratorAccess Permissions Attached to a Role | Modification |
|
|
|
| |
Low | AdministratorAccess Permissions were attached to a Role | Modification |
|
|
|
| |
Informational | An Image Was Pushed to a Repository | Modification |
|
|
|
| |
Critical | An S3 object is Public Accessible | Modification |
|
|
|
| |
Low | Azure App Role Assigned to Service Principals/Users/Groups | Modification |
|
|
|
| |
High | Same User Login Attempt From Multiple Sources in a Short Period | Modification |
|
|
|
| |
Informational | Blob Deleted | Modification |
|
|
|
| |
Informational | CloudWatch Log Group Created | Modification |
|
|
|
| |
Low | VPC Deleted | Modification |
|
|
|
| |
Critical | EBS Snapshot Permission Modified to Public Access | Modification |
|
|
|
| |
High | Shared EBS Snapshot Was Copied by an External Account | Modification |
|
|
|
| |
Informational | Failed Login Attempts to Your AWS Console Using an Invalid Username | Modification |
|
|
|
| |
Medium | FullAccess Permissions Attached to a User | Modification |
|
|
|
| |
Low | Function App Host Master Key Modified | Modification |
|
|
|
| |
Low | EKS Cluster Control Plane Logs Disabled | Modification |
|
|
|
| |
Low | Several Failed Logins Attempts Followed by a Successful Login to Your AWS Console | Modification |
|
|
|
| |
High | Login Attempt to AWS Console From a Malicious IP Address | Modification |
|
|
|
| |
High | Login Attempt to Alibaba console From a Malicious IP Address | Modification |
|
|
|
| |
High | Login Attempt to Azure From a Malicious IP Address | Modification |
|
|
|
| |
Low | Modification Subnet Attributes | Modification |
|
|
|
| |
High | Outbound Traffic From DB Ports Within a Kubernetes Cluster to Internet Destination | Modification |
|
|
|
| |
High | Outbound Traffic From DB Ports to Internet Destination | Modification |
|
|
|
| |
High | Outbound Traffic From VPC to Internet Destination Using SMB | Modification |
|
|
|
| |
High | Outbound Traffic From a VPC to an Internet Destination Using RDP | Modification |
|
|
|
| |
High | Outbound Traffic From VPC to Internet Destination Using RDP | Modification |
|
|
|
| |
High | Outbound Traffic From VPC to Internet Destination Using RDP | Modification |
|
|
|
| |
Critical | Outbound Traffic to Tor Exit Node | Modification |
|
|
|
| |
Critical | Outbound Traffic to Tor Exit Node | Modification |
|
|
|
| |
Critical | Outbound Traffic to Tor Exit Node From Within a Kubernetes Cluster | Modification |
|
|
|
| |
Critical | Outbound Traffic to Tor Exit Node | Modification |
|
|
|
| |
High | Suspicious Outbound Traffic to a Suspected CnC Server | Modification |
|
|
|
| |
Critical | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Critical | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Critical | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Critical | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Medium | Overly-Permissive Trust Policy Attached to a Role | Modification |
|
|
|
| |
Low | Password Policy Change | Modification |
|
|
|
| |
High | RDS Instance Publicly Accessible | Modification |
|
|
|
| |
Low | S3 Bucket Deleted | Modification |
|
|
|
| |
High | Series of Enumeration API Calls Executed in Several Regions | Modification |
|
|
|
| |
High | Suspicious StartSession Event Was Triggered | Modification |
|
|
|
|
January 15 2023
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
High | Azure SUPERMAN Login | Modification |
|
|
|
| |
Medium | Same User Login Attempt From Multiple Sources in a Short Period | Modification |
|
|
|
| |
Low | K8S Pod Access to Metadata | Modification |
|
|
|
| |
Informational | Outbound Traffic From a Kubernetes Cluster to Internet Destination Using SSH | Modification |
|
|
|
| |
Medium | Outbound Traffic From a VPC to an Internet Destination Using RDP | Modification |
|
|
|
| |
Medium | Outbound Traffic to Tor Exit Node From Within a Kubernetes Cluster | Modification |
|
|
|
| |
Medium | Outbound Traffic to a Compromised Server From a Kubernetes Cluster | Modification |
|
|
|
| |
Low | Suspicious Outbound Traffic to a CnC Server From a Kubernetes Cluster | Modification |
|
|
|
| |
High | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
| |
Low | Suspicious DNS Packet Size | Modification |
|
|
|
| |
Low | Suspicious DNS Packet Size From a Kubernetes Pod | Modification |
|
|
|
| |
Low | Suspicious DNS Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious DNS Packets Volume From a Kubernetes Pod | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
|
| |
Medium | Large Number of Failed Logins Followed by a Successful Login to Your Azure Account | Removal |
|
|
|
|
December 25 2022
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Low | Function Bindings Modified | Modification |
|
|
|
| |
Low | Azure Login Attempt With 2 Different User-Agents in a Short Time | Modification |
|
|
|
| |
High | Outbound Traffic to Tor Exit Node | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
| |
Low | Suspicious NTP Packet Size | Modification |
|
|
|
|
December 11 2022
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Informational | Abuse of Role Credentials | Modification |
|
|
|
| |
High | Inbound Accepted Traffic to a Kubernetes Cluster From a Malicious IP Address | Modification |
|
|
|
| |
High | Inbound Accepted Traffic From a Malicious IP Address | Modification |
|
|
|
| |
Low | Large Number of Failed Logins to Azure | Modification |
|
|
|
| |
Informational | Multiple New Instances Launched in a Short Period by a Specific User | Modification |
|
|
|
| |
Low | Outbound Traffic From DB Ports to Internet Destination | Modification |
|
|
|
| |
Informational | Outbound Traffic From a Kubernetes Cluster to Internet Destination Using SSH | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset From a Kubernetes Pod | Modification |
|
|
|
| |
Informational | Security Group Modification | Modification |
|
|
|
| |
Low | Suspicious Outbound Traffic to a Phishing Server | Modification |
|
|
|
|
November 28 2022
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Informational | Abuse of Role Credentials | New |
|
|
|
| |
High | Crypto mining terms have been identified | New |
|
|
|
| |
Low | EC2 created in multiple regions | New |
|
|
|
| |
High | Inbound Accepted Traffic From a Malicious IP Address | Modification |
|
|
|
| |
Low | Large Number of Failed Logins to Azure | Modification |
|
|
|
| |
Critical | Login Attempt to Azure From a Malicious IP Address | Modification |
|
|
|
| |
High | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Medium | Overly-Permissive SNS Policy | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset From a Kubernetes Pod | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume From a Kubernetes Pod | Modification |
|
|
|
| |
High | Unsecured Task Definition Created - hostPath | Modification |
|
|
|
| |
High | Unsecured Task Definition Created - Env Var and Command | Modification |
|
|
|
| |
Informational | User Data has been modified | New |
|
|
|
| |
High | Abuse of Access Token Generated by STS Dedicated For Lambda | Removal |
|
|
|
| |
High | Abuse of Access Token Generated by STS Dedicated For EC2 | Removal |
|
|
|
| |
Critical | Abuse of Access Token Generated by STS Dedicated for ECS | Removal |
|
|
|
| |
Critical | Abuse of Access Token Generated by STS Dedicated For Kubernetes Node Group | Removal |
|
|
|
| |
Critical | Abuse of Access Token Generated by STS Dedicated For Kubernetes Pod | Removal |
|
|
|
| |
Low | Container Deleted | Removal |
|
|
|
| |
Informational | Container Created | Removal |
|
|
|
|
November 13 2022
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Low | Function Bindings Modified | Modification |
|
|
|
| |
High | Inbound Accepted Traffic From a Malicious IP Address | Modification |
|
|
|
| |
Medium | Outbound Traffic From DB Ports Within a Kubernetes Cluster to Internet Destination | Modification |
|
|
|
| |
High | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
|
November 07 2022
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Low | Internal Rejected Traffic | Modification |
|
|
|
| |
Medium | Outbound Traffic From DB Ports Within a Kubernetes Cluster to Internet Destination | Modification |
|
|
|
| |
Medium | Outbound Traffic From a VPC to an Internet Destination Using RDP | Modification |
|
|
|
| |
High | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Medium | Ping Sweep Activity From Within a Kubernetes Pod | Modification |
|
|
|
| |
Medium | Ping Sweep Activity | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
|
November 06 2022
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Low | Internal Rejected Traffic | Modification |
|
|
|
| |
Low | Internal Rejected Traffic | Modification |
|
|
|
| |
High | K8S Pod Access to Metadata | Modification |
|
|
|
| |
Medium | K8S SSH Access to Nodes From Pods | Modification |
|
|
|
| |
Medium | Outbound Traffic From DB Ports Within a Kubernetes Cluster to Internet Destination | Modification |
|
|
|
| |
Medium | Outbound Traffic From DB Ports to Internet Destination | Modification |
|
|
|
| |
Low | Outbound Traffic From VPC to Internet Destination Using SMB | Modification |
|
|
|
| |
Informational | Outbound Traffic From a Kubernetes Cluster to Internet Destination Using SSH | Modification |
|
|
|
| |
Medium | Outbound Traffic From a VPC to an Internet Destination Using RDP | Modification |
|
|
|
| |
Informational | Outbound Traffic From VPC to Internet Destination Using RDP | Modification |
|
|
|
| |
Low | Outbound Traffic Suspected as Cryptomining Activity | Modification |
|
|
|
| |
High | Outbound Traffic to Tor Exit Node | Modification |
|
|
|
| |
Medium | Suspicious Outbound Traffic to a Suspected CnC Server | Modification |
|
|
|
| |
High | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Medium | Ping Sweep Activity From Within a Kubernetes Pod | Modification |
|
|
|
| |
Medium | Ping Sweep Activity | Modification |
|
|
|
| |
High | Port Scan of Internal Asset From ECS | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset From a Kubernetes Pod | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
| |
Low | Suspicious DNS Packet Size | Modification |
|
|
|
| |
Low | Suspicious DNS Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious NTP Packet Size | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious Outbound Traffic to a Phishing Server | Modification |
|
|
|
| |
High | Unsecured Task Definition Created - Dangerous Capabilities | Modification |
|
|
|
| |
Medium | Unusual Exposed Ports on Instance | Modification |
|
|
|
| |
Low | Outbound Traffic From a Kubernetes Cluster Suspected as Cryptomining Activity | Removal |
|
|
|
|
October 30 2022
Note: This is the first RN, Include all changes from 11.09.2022 to 30.10.2022
Rule ID | Severity | Rule Name | Change Type | Updated Content | Before | After | Affected Rulesets |
---|---|---|---|---|---|---|---|
Informational | GuardDuty Disabled | Modification |
|
|
|
| |
Low | GuardDuty Suspended | Modification |
|
|
|
| |
Medium | Administrator Permissions Attached to a Role | Modification |
|
|
|
| |
Low | Administrator Permissions Attached to a User | Modification |
|
|
|
| |
Low | IAM Permissions Enumeration | Modification |
|
|
|
| |
Low | Internal Rejected Traffic | Modification |
|
|
|
| |
Low | Internal Rejected Traffic | Modification |
|
|
|
| |
High | K8S Pod Access to Metadata | Modification |
|
|
|
| |
Medium | K8S SSH Access to Nodes From Pods | Modification |
|
|
|
| |
Critical | Login Attempt to Alibaba console From a Malicious IP Address | Modification |
|
|
|
| |
Medium | Outbound Traffic From DB Ports Within a Kubernetes Cluster to Internet Destination | Modification |
|
|
|
| |
Medium | Outbound Traffic From DB Ports to Internet Destination | Modification |
|
|
|
| |
Low | Outbound Traffic From VPC to Internet Destination Using SMB | Modification |
|
|
|
| |
Informational | Outbound Traffic From a Kubernetes Cluster to Internet Destination Using SSH | Modification |
|
|
|
| |
Informational | Outbound Traffic From VPC to Internet Destination Using RDP | Modification |
|
|
|
| |
Low | Outbound Traffic Suspected as Cryptomining Activity | Modification |
|
|
|
| |
High | Outbound Traffic to Tor Exit Node | Modification |
|
|
|
| |
Medium | Suspicious Outbound Traffic to a Suspected CnC Server | Modification |
|
|
|
| |
High | Outbound Traffic to Malicious IP Addresses | Modification |
|
|
|
| |
Medium | Ping Sweep Activity From Within a Kubernetes Pod | Modification |
|
|
|
| |
Medium | Ping Sweep Activity | Modification |
|
|
|
| |
High | Port Scan of Internal Asset From ECS | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset From a Kubernetes Pod | Modification |
|
|
|
| |
High | Port Scanning of an Internal Asset | Modification |
|
|
|
| |
Informational | Project IAM Policy Updated | Modification |
|
|
|
| |
Informational | Service Account IAM Policy Updated | Modification |
|
|
|
| |
Low | Successful Login Without MFA | Modification |
|
|
|
| |
Low | Suspicious DNS Packet Size | Modification |
|
|
|
| |
Low | Suspicious DNS Packets Volume Per Session | Modification |
|
|
|
| |
High | Suspicious ECS Task Has Been Executed | Modification |
|
|
|
| |
Low | Suspicious NTP Packet Size | Modification |
|
|
|
| |
Low | Suspicious NTP Packets Volume Per Session | Modification |
|
|
|
| |
Low | Suspicious Outbound Traffic to a Phishing Server | Modification |
|
|
|
| |
High | Unsecured Task Definition Created - Privileged Container | Modification |
|
|
|
| |
Medium | Unusual Exposed Ports on Instance | Modification |
|
|
|
|