Skip to content

Commit d7830fc

Browse files
[Security Rules] Update security rules package to v8.7.3-beta.1 (#6006)
* [Security Rules] Update security rules package to v8.7.3-beta.1 * Add changelog entry for 8.7.3-beta.1 --------- Co-authored-by: protectionsmachine <[email protected]>
1 parent 74e5864 commit d7830fc

File tree

1,616 files changed

+80375
-73458
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,616 files changed

+80375
-73458
lines changed

packages/security_detection_engine/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
# newer versions go on top
22
# NOTE: please use pre-release versions (e.g. -beta.0) until a package is ready for production
3+
- version: 8.7.3-beta.1
4+
changes:
5+
- description: Release security rules update
6+
type: enhancement
7+
link: https://github.com/elastic/integrations/pull/6006
38
- version: 8.6.3
49
changes:
510
- description: Release security rules update

packages/security_detection_engine/kibana/security_rule/000047bb-b27a-47ec-8b62-ef1a5d2c9e19.json

Lines changed: 0 additions & 86 deletions
This file was deleted.
Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
{
2+
"attributes": {
3+
"author": [
4+
"Elastic"
5+
],
6+
"description": "Detects attempts to modify a rule within an Okta policy. An adversary may attempt to modify an Okta policy rule in order to weaken an organization's security controls.",
7+
"false_positives": [
8+
"Consider adding exceptions to this rule to filter false positives if Okta MFA rules are regularly modified in your organization."
9+
],
10+
"index": [
11+
"filebeat-*",
12+
"logs-okta*"
13+
],
14+
"language": "kuery",
15+
"license": "Elastic License v2",
16+
"name": "Attempt to Modify an Okta Policy Rule",
17+
"note": "",
18+
"query": "event.dataset:okta.system and event.action:policy.rule.update\n",
19+
"references": [
20+
"https://help.okta.com/en/prod/Content/Topics/Security/Security_Policies.htm",
21+
"https://developer.okta.com/docs/reference/api/system-log/",
22+
"https://developer.okta.com/docs/reference/api/event-types/",
23+
"https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy"
24+
],
25+
"related_integrations": [
26+
{
27+
"package": "okta",
28+
"version": "^1.3.0"
29+
}
30+
],
31+
"required_fields": [
32+
{
33+
"ecs": true,
34+
"name": "event.action",
35+
"type": "keyword"
36+
},
37+
{
38+
"ecs": true,
39+
"name": "event.dataset",
40+
"type": "keyword"
41+
}
42+
],
43+
"risk_score": 21,
44+
"rule_id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19",
45+
"setup": "The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.",
46+
"severity": "low",
47+
"tags": [
48+
"Elastic",
49+
"Identity",
50+
"Okta",
51+
"Continuous Monitoring",
52+
"SecOps",
53+
"Identity and Access",
54+
"Defense Evasion"
55+
],
56+
"threat": [
57+
{
58+
"framework": "MITRE ATT\u0026CK",
59+
"tactic": {
60+
"id": "TA0005",
61+
"name": "Defense Evasion",
62+
"reference": "https://attack.mitre.org/tactics/TA0005/"
63+
},
64+
"technique": [
65+
{
66+
"id": "T1562",
67+
"name": "Impair Defenses",
68+
"reference": "https://attack.mitre.org/techniques/T1562/",
69+
"subtechnique": [
70+
{
71+
"id": "T1562.007",
72+
"name": "Disable or Modify Cloud Firewall",
73+
"reference": "https://attack.mitre.org/techniques/T1562/007/"
74+
}
75+
]
76+
}
77+
]
78+
}
79+
],
80+
"timestamp_override": "event.ingested",
81+
"type": "query",
82+
"version": 102
83+
},
84+
"id": "000047bb-b27a-47ec-8b62-ef1a5d2c9e19_102",
85+
"type": "security-rule"
86+
}

packages/security_detection_engine/kibana/security_rule/00140285-b827-4aee-aa09-8113f58a08f3.json

Lines changed: 0 additions & 118 deletions
This file was deleted.

0 commit comments

Comments
 (0)