Skip to content

Latest commit

 

History

History
51 lines (42 loc) · 1.64 KB

MATCH-S00677.md

File metadata and controls

51 lines (42 loc) · 1.64 KB

Rules: AWS Route 53 Service Tampering

Description

Detects various AWS Route 53 API actions that involve the alteration of a Route 53 service.

Additional Details

Detail Value
Type Templated Match
Category Defense Evasion
Apply Risk to Entities device_ip, user_username, srcDevice_ip, device_hostname, srcDevice_hostname
Signal Name AWS Route 53 Service Tampering - {{action}}
Summary Expression {{action}} performed by user: {{user_username}}
Score/Severity Dynamic: 3 or 5
Enabled by Default True
Prototype False
Tags _mitreAttackTechnique:T1562, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1562.008, _mitreAttackTechnique:T1562.001

Vendors and Products

Dynamic Signal Score/Severity Translation

The default score of 5 is used as a catch all if none of the translations are met.

Schema Field Field Value Score/Severity
action UpdateResolverRule 3
action UpdateResolverEndpoint 3
action UpdateResolverDnssecConfig 3
action UpdateFirewallRuleGroupAssociation 3
action UpdateFirewallRule 3
action UpdateFirewallDomains 3
action UpdateFirewallConfig 3
action DisassociateResolverRule 3

Fields Used

Origin Field
Normalized Schema action
Normalized Schema application
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema listMatches
Normalized Schema metadata_product
Normalized Schema metadata_vendor
Normalized Schema srcDevice_hostname
Normalized Schema srcDevice_ip
Normalized Schema user_username