Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Filebeat]Cloudtrail: parse consoleLogin additional data #16110

Closed
ynirk opened this issue Feb 5, 2020 · 1 comment · Fixed by #17155
Closed

[Filebeat]Cloudtrail: parse consoleLogin additional data #16110

ynirk opened this issue Feb 5, 2020 · 1 comment · Fixed by #17155
Assignees

Comments

@ynirk
Copy link

ynirk commented Feb 5, 2020

Describe the enhancement:
In order to capture users login without MFA and create an alert on it, we'd need to parse the additionalEventData field from cloudtrail logs when the eventName is consoleLogin Ref

The resulting field would look like aws.cloudtrail.console_login.additional_eventdata.mfa_used

Based on a discussion with @leehinman we could extend this to something more generic for specific eventName where parsing request_parameters, response_elements or additional_eventdata makes sense

aws.cloudtrail.<eventName>.request_parameters.<others>
aws.cloudtrail.<eventName>.response_elements.<others>
aws.cloudtrail.<eventName>.additional_eventdata.<others>
@elasticmachine
Copy link
Collaborator

Pinging @elastic/siem (Team:SIEM)

leehinman added a commit to leehinman/beats that referenced this issue Mar 20, 2020
- sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type
- sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id
- sessionIssuer.userName -> user.name
- sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn
- sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id
- add aws.cloudtrail.console_login.additional_eventdata.mobile_version
- add aws.cloudtrail.console_login.additional_eventdata.login_to
- add aws.cloudtrail.console_login.additional_eventdata.mfa_used
- copy source.address to source.ip if value is an IP address

Closes elastic#16086
Closes elastic#16110
leehinman added a commit that referenced this issue Mar 23, 2020
* Improve AWS cloudtrail field mappings

- sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type
- sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id
- sessionIssuer.userName -> user.name
- sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn
- sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id
- add aws.cloudtrail.console_login.additional_eventdata.mobile_version
- add aws.cloudtrail.console_login.additional_eventdata.login_to
- add aws.cloudtrail.console_login.additional_eventdata.mfa_used
- copy source.address to source.ip if value is an IP address

Closes #16086
Closes #16110
leehinman added a commit to leehinman/beats that referenced this issue Mar 23, 2020
* Improve AWS cloudtrail field mappings

- sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type
- sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id
- sessionIssuer.userName -> user.name
- sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn
- sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id
- add aws.cloudtrail.console_login.additional_eventdata.mobile_version
- add aws.cloudtrail.console_login.additional_eventdata.login_to
- add aws.cloudtrail.console_login.additional_eventdata.mfa_used
- copy source.address to source.ip if value is an IP address

Closes elastic#16086
Closes elastic#16110

(cherry picked from commit 57e194b)
leehinman added a commit that referenced this issue Mar 23, 2020
* Improve AWS cloudtrail field mappings

- sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type
- sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id
- sessionIssuer.userName -> user.name
- sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn
- sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id
- add aws.cloudtrail.console_login.additional_eventdata.mobile_version
- add aws.cloudtrail.console_login.additional_eventdata.login_to
- add aws.cloudtrail.console_login.additional_eventdata.mfa_used
- copy source.address to source.ip if value is an IP address

Closes #16086
Closes #16110

(cherry picked from commit 57e194b)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants