Skip to content

Commit

Permalink
Descriptions enhanced and version updated
Browse files Browse the repository at this point in the history
  • Loading branch information
erincrawford committed Jul 9, 2024
1 parent 364e05e commit 7d47d4b
Show file tree
Hide file tree
Showing 2 changed files with 9 additions and 9 deletions.
2 changes: 1 addition & 1 deletion package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@jupiterone/jupiterone-alert-rules",
"version": "0.31.0",
"version": "0.32.0",
"description": "Alert rule packages for the JupiterOne platform",
"scripts": {
"validate": "tsx ./scripts/validate.ts"
Expand Down
16 changes: 8 additions & 8 deletions rule-packs/aws-privilege-escalation.json
Original file line number Diff line number Diff line change
Expand Up @@ -181,7 +181,7 @@
},
{
"name": "aws-ability-to-create-a-codestar-project-and-associate-as-project-owner",
"description": "Users with the codestar:CreateProject and codestar:AssociateTeamMember permissions can create a new CodeStar project and associate themselves as an Owner of the project.",
"description": "Users with the codestar:CreateProject and codestar:AssociateTeamMember permissions can create a new CodeStar project and associate themselves as an Owner of the project. This will attach a new policy to the user that provides access to numerous permissions for AWS services.",
"queries": [
{
"name": "query0",
Expand All @@ -193,7 +193,7 @@
},
{
"name": "aws-ability-to-remove-permissions-boundary-from-a-role",
"description": "Users with the iam:DeleteRolePermissionsBoundary permission can remove a permissions boundary from a role they have access to.",
"description": "Users with the iam:DeleteRolePermissionsBoundary permission can remove a permissions boundary from a role they have access to, which may increase the role's effective permissions if the permissions boundary is more restrictive than any of the role's identity-based policies.",
"queries": [
{
"name": "query0",
Expand All @@ -205,7 +205,7 @@
},
{
"name": "aws-ability-to-delete-an-inline-policy-from-a-role",
"description": "Users with the iam:DeleteRolePolicy permission can delete an inline policy from a role they have access to.",
"description": "Users with the iam:DeleteRolePolicy permission can delete an inline policy from a role they have access to, which may increase the role's effective permissions if the policy contains explicit deny statements allowed by any of the role's other policies.",
"queries": [
{
"name": "query0",
Expand All @@ -217,7 +217,7 @@
},
{
"name": "aws-ability-to-delete-an-inline-policy-from-a-user",
"description": "Users with the iam:DeleteUserPolicy permission can delete an inline policy from a user they have access to. ",
"description": "Users with the iam:DeleteUserPolicy permission can delete an inline policy from a user they have access to, which may increase the user's effective permissions if the policy contains explicit deny statements allowed by any of the user's other policies. ",
"queries": [
{
"name": "query0",
Expand All @@ -229,7 +229,7 @@
},
{
"name": "aws-ability-to-remove-a-managed-policy-from-a-user",
"description": "Users with the iam:DetachUserPolicy permission can remove a managed policy from a user they have access to.",
"description": "Users with the iam:DetachUserPolicy permission can remove a managed policy from a user they have access to, which may increase the role's effective permissions if the policy contains explicit deny statements allowed by any of the role's other policies.",
"queries": [
{
"name": "query0",
Expand All @@ -241,7 +241,7 @@
},
{
"name": "aws-ability-to-update-a-permissions-boundary-attached-to-a-user",
"description": "A user with the iam:PutUserPermissionsBoundary can update a permissions boundary attached to a user they have access to.",
"description": "Users with the iam:PutUserPermissionsBoundary can update a permissions boundary attached to a user they have access to, which may increase the user's effective permissions if the permissions boundary is more restrictive than any of the role's identity-based policies.",
"queries": [
{
"name": "query0",
Expand All @@ -265,7 +265,7 @@
},
{
"name": "aws-ability-to-remove-a-managed-policy-from-a-role",
"description": "Users with the iam:DetachRolePolicy permission can remove a managed policy from a role they have access to.",
"description": "Users with the iam:DetachRolePolicy permission can remove a managed policy from a role they have access to, which may increase the role's effective permissions if the policy contains explicit deny statements allowed by any of the role's other policies.",
"queries": [
{
"name": "query0",
Expand All @@ -277,7 +277,7 @@
},
{
"name": "aws-ability-to-update-a-permissions-boundary-attached-to-a-role",
"description": "A user with the iam:PutRolePermissionsBoundary can update a permissions boundary attached to a role they have access to.",
"description": "A user with the iam:PutRolePermissionsBoundary can update a permissions boundary attached to a role they have access to, which may increase the role's effective permissions if the permissions boundary is more restrictive than any of the role's identity-based policies.",
"queries": [
{
"name": "query0",
Expand Down

0 comments on commit 7d47d4b

Please sign in to comment.