[Rule Tunings] AWS S3 Bucket Replicated to Another Account | AWS S3 Bucket Policy Added to Share with External Account #5405
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request
Issue link(s):
Summary - What I changed
AWS S3 Bucket Replicated to Another Account
event.typeasevent_category_overridefieldinfoinstead ofanyand addedAccount=instead ofAccountto help reduce chances of capturing unintended requests.Current Rule alerts as expected
working query with
event.type = infoasevent_category_overrideAWS S3 Bucket Policy Added to Share with External Account
event.outcome = successto query to reduce noise from failed attemptsFailed attempts captured by existing rule
How To Test
You can use these scripts for testing or run the queries against test data in our stack
trigger_exfiltration_s3_bucket_replicated_to_external_account.py
trigger_exfiltration_s3_bucket_policy_added_for_external_account_access.py