-
Notifications
You must be signed in to change notification settings - Fork 905
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update(rules): ehanced rules tagging for inventory / threat modeling #2167
Conversation
/milestone 0.34.0 |
Hi @incertum, I totally agre with tags I do really like the "accuracy" tag idea. However it's hard to evaluate the FP ratio in advance and in reliable way since it's often based on "feeling" about the possible noise. However if we agree how to set this ratio, it would be a good way to split noisy rules from high confident security rules and enable them based on the use cases. |
Ok, for rules that work for both host and in a container, like this one https://github.com/falcosecurity/falco/pull/2167/files#diff-ea7e90b2fb13b5aa2c8e6799c1ea20612e8bd29a13c61dfb3653f03f0235436eR1738 confirming that it is ok to add both tags,
Agreed, if you have ideas on how to set these ratios, that would be cool. Even very imperfect ratios could help setting expectations for each rule. |
cc @Kaizhe 🤗 |
1aaab8c
to
9ab4650
Compare
Published a HackMD preview of the new markdown doc here. In addition to updating the rules |
9ab4650
to
d6d26c5
Compare
Hi @incertum amazing work! Both inventory and the Mitre TTP mapping is really helpful to understand the coverage. |
I agree with @darryk10 , however, I think it's ok to address the points you raised in follow-up PRs. |
Signed-off-by: Melissa Kilby <melissa.kilby.oss@gmail.com>
* add ad-hoc python script to generate Falco default rules overview markdown document * init rules_inventory/rules_overview.md doc Signed-off-by: Melissa Kilby <melissa.kilby.oss@gmail.com>
Signed-off-by: Melissa Kilby <melissa.kilby.oss@gmail.com>
d6d26c5
to
ce2d337
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
PS I had to rebase the PR because of a conflict.
LGTM label has been added. Git tree hash: a2ad7811d96d93ba32f7fe91622c7bcf39454777
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
Amazing work!
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: FedeDP, incertum, leogr The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Signed-off-by: Melissa Kilby melissa.kilby.oss@gmail.com
What type of PR is this?
/kind cleanup
/kind documentation
/kind feature
/kind rule-update
Any specific area of the project related to this PR?
/area rules
What this PR does / why we need it:
Proposing subtle changes in tagging rules for inventory and thread modeling purposes.
(1) Add Mitre TTP code(s) [1, 2] to rules under existing
tags
.Besides better inventory and threat modeling, this will allow us to quantify areas of improvements for Falco from a threat modeling perspective. Mitre TTP code(s) also provide end users less familiar with system level threats and exploitations with additional information.
(2) Adjust
container
andhost
tags usage.Why not add
host
and/orcontainer
(either only one or both if applicable) to each rule? Could be more informative for inventory purposes when parsing and aggregating fields in the yaml to for example be able to know if certain threats are only addressed for container workloads or also on the underlying host etc.(3) [Future Options]
While we do have the
priority
tagA case-insensitive representation of the severity of the event.
sometimes wonder if additional tags aroundaccuracy
orscope
of the rule could be useful for everyone in addition to existing tags.References:
[1] https://attack.mitre.org/tactics/enterprise/
[2] https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
CC @leogr
Does this PR introduce a user-facing change?: