forked from sar2901/security_content
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathaws_investigate_security_hub_alerts_by_dest.yml
39 lines (39 loc) · 1.28 KB
/
aws_investigate_security_hub_alerts_by_dest.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
name: AWS Investigate Security Hub alerts by dest
id: b0d2e6a8-75fa-4b1b-9486-3d32acadf822
version: 1
date: '2020-06-08'
author: Bhavin Patel, Splunk
type: Investigation
datamodel: []
description: This search retrieves the all the alerts created by AWS Security Hub
for a specific dest(instance_id).
search: '`aws_securityhub_firehose` "findings{}.Resources{}.Type"=AWSEC2Instance |
rex field=findings{}.Resources{}.Id .*instance/(?<instance>.*)| rename instance
as dest| search dest = $dest$ |rename findings{}.* as * | rename Remediation.Recommendation.Text
as Remediation | table dest Title ProductArn Description FirstObservedAt RecordState
Remediation'
how_to_implement: You must install the AWS App for Splunk (version 5.1.0 or later)
and Splunk Add-on for AWS (version 4.4.0 or later), then configure your CloudTrail
inputs.
known_false_positives: ''
references: []
tags:
analytic_story:
- Cloud Compute Instance
- Cloud Cryptomining
- Suspicious AWS EC2 Activities
- AWS Suspicious Provisioning Activities
product:
- Splunk Phantom
required_fields:
- _time
- findings{}.Resources{}.Type
- findings{}.Resources{}.Id
- instance
- Remediation.Recommendation.Text
- Title
- ProductArn
- Description
- FirstObservedAt
- RecordState
security_domain: network