Skip to content

Commit

Permalink
Merge pull request #1031 from vishnusomank/release
Browse files Browse the repository at this point in the history
[Update] Policy name changes
  • Loading branch information
vishnusomank authored Jan 9, 2023
2 parents 05c60da + ebc38cf commit 3ae5d88
Show file tree
Hide file tree
Showing 6 changed files with 23 additions and 23 deletions.
6 changes: 3 additions & 3 deletions MySQL/system/metadata.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
version: v0.1.6
version: v0.1.7
policyRules:
- name: cis-mysql-1-2
- name: user-grp-mod
precondition:
- /usr/bin/mysql
- /usr/sbin/groupadd
Expand All @@ -13,7 +13,7 @@ policyRules:
tldr: Audit access to useradd and groupadd command!
detailed: Utilizing a least privilege account for MySQL to execute as needed may reduce the impact of a MySQL-born vulnerability. A restricted account will be unable to access resources unrelated to MySQL, such as operating system configurations.
yaml: ksp-audit-cis-mysql-1-2.yaml
- name: audit-access-to-mysqldump
- name: mysqldump-bin-exec
precondition:
- /usr/bin/mysqldump
description:
Expand Down
6 changes: 3 additions & 3 deletions elastic/system/metadata.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
version: v0.1.6
version: v0.1.7
policyRules:
- name: elastic-search-indices-insecure-directory
- name: elasticsearch-indices-dir
precondition:
- /usr/share/elasticsearch/data/nodes/0/indices/
description:
Expand All @@ -11,7 +11,7 @@ policyRules:
tldr: Elastic search indices directory contains vulnerable and insecure information
detailed: Elastic directory contains insecure information that leads to security vulnerability.
yaml: ksp-audit-elasticsearch-indices.yaml
- name: elastic-search-log-file-access
- name: elasticsearch-log-files
precondition:
- /var/log/elasticsearch/
description:
Expand Down
2 changes: 1 addition & 1 deletion generic/system/ksp-audit-maintenance-tool-access.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,4 @@ spec:
matchDirectories:
- dir: /sbin/
recursive: true
action: Block
action: Audit
24 changes: 12 additions & 12 deletions generic/system/metadata.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
version: v0.1.6
version: v0.1.7
policyRules:
- name: maintenance-tool-access
- name: maint-tools-access
precondition:
- /sbin/*
- OPTSCAN
Expand All @@ -14,7 +14,7 @@ policyRules:
never be used in prod env, or if used, should be used only in certain time frames.
Examples include, dynamic package management tools, mii-tool, iptables etc
yaml: ksp-audit-maintenance-tool-access.yaml
- name: cert-access
- name: trusted-cert-mod
precondition:
- /etc/ssl/.*
- OPTSCAN
Expand Down Expand Up @@ -51,7 +51,7 @@ policyRules:
Information Discovery during automated discovery to shape follow-on behaviors, including whether or not the
adversary fully infects the target and/or attempts specific actions.
yaml: ksp-mitre-system-owner-user-discovery.yaml
- name: system-monitoring-deny-write-under-bin-directory
- name: write-under-bin-dir
precondition:
- /bin/*
- OPTSCAN
Expand All @@ -67,7 +67,7 @@ policyRules:
for example, by observing audit activities in real time or by observing other system aspects
such as access patterns, characteristics of access, and other actions.
yaml: ksp-nist-si-4-mkdir-bin-dir.yaml
- name: system-monitoring-write-under-dev-directory
- name: write-under-dev-dir
precondition:
- /dev/*
- OPTSCAN
Expand All @@ -83,7 +83,7 @@ policyRules:
for example, by observing audit activities in real time or by observing other system aspects
such as access patterns, characteristics of access, and other actions.
yaml: ksp-nist-si-4-create-file-in-dev-dir.yaml
- name: system-monitoring-detect-access-to-cronjob-files
- name: cronjob-cfg
precondition:
- /var/cron/*
- OPTSCAN
Expand All @@ -99,7 +99,7 @@ policyRules:
for example, by observing audit activities in real time or by observing other system aspects
such as access patterns, characteristics of access, and other actions.
yaml: ksp-nist-si-4-detect-access-to-cron-job-files.yaml
- name: least-functionality-execute-package-management-process-in-container
- name: pkg-mngr-exec
precondition:
- /bin/*
- OPTSCAN
Expand All @@ -115,7 +115,7 @@ policyRules:
levels of detail. These levels include applications, application programming interfaces, application modules,
scripts, system processes, system services, kernel functions, registries, drivers, and dynamic link libraries.
yaml: ksp-nist-si-4-execute-package-management-process-in-container.yaml
- name: deny-k8s-client-tool-execution-inside container
- name: k8s-client-tool-exec
precondition:
- /usr/local/bin/kubectl
description:
Expand All @@ -126,7 +126,7 @@ policyRules:
tldr: Adversaries may abuse a container administration service to execute commands within a container.
detailed: Adversaries may abuse a container administration service to execute commands within a container. A container administration service such as the Docker daemon, the Kubernetes API server, or the kubelet may allow remote management of containers within an environment.
yaml: ksp-deny-k8s-client-tool-execution-inside container.yaml
- name: deny-remote-file-copy
- name: remote-file-copy
precondition:
- /usr/bin/rsync
- OPTSCAN
Expand All @@ -138,7 +138,7 @@ policyRules:
tldr: The adversary is trying to steal data.
detailed: Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.
yaml: ksp-deny-remote-file-copy.yaml
- name: deny-write-in-shm-folder
- name: write-in-shm-dir
precondition:
- /dev/shm*
- OPTSCAN
Expand All @@ -150,7 +150,7 @@ policyRules:
tldr: The adversary is trying to write under shm folder
detailed: The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data.
yaml: ksp-deny-write-in-shm-folder.yaml
- name: deny-write-under-etc-directory
- name: write-etc-dir
precondition:
- /etc*
- OPTSCAN
Expand All @@ -162,7 +162,7 @@ policyRules:
tldr: The adversary is trying to avoid being detected.
detailed: Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
yaml: ksp-deny-write-under-etc-directory.yaml
- name: deny-write-under-etc-directory
- name: shell-history-mod
precondition:
- /root/*_history
- OPTSCAN
Expand Down
4 changes: 2 additions & 2 deletions kibana/system/metadata.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
version: v0.1.6
version: v0.1.7
policyRules:
- name: elastic-kibana-panel-exposed
- name: kibana-panel
precondition:
- /usr/share/kibana
description:
Expand Down
4 changes: 2 additions & 2 deletions redis/system/metadata.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
version: v0.1.6
version: v0.1.7
policyRules:
- name: system-recovery-and-reconstitution
- name: redis-sys-path
precondition:
- /usr/local/bin/redis-cli
- /usr/local/bin/redis-server
Expand Down

0 comments on commit 3ae5d88

Please sign in to comment.