Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] WAF log type support #573

Closed
sandeshkr419 opened this issue Sep 13, 2023 · 0 comments · Fixed by #617
Closed

[FEATURE] WAF log type support #573

sandeshkr419 opened this issue Sep 13, 2023 · 0 comments · Fixed by #617
Labels
enhancement New feature or request untriaged

Comments

@sandeshkr419
Copy link
Contributor

sandeshkr419 commented Sep 13, 2023

Is your feature request related to a problem?
This issue discusses the addition of waf log group support in Security Analytics plugin. This role will correspond to Web Application Firewall (WAF) use-cases. The role of WAF (Web Application Firewall) is to monitor and filter HTTP traffic between a web application and internet. It is tasked to prevent common security attacks such as cross-site scripting (XSS), SQL Injection (SQi), etc. This new log type is for users that require monitoring for WAF use case out of the box from Security Plugin.

What solution would you like?
Presently, SA plugin supports network log group which has a sub-section firewall which is a group of network firewall related rules. Network firewall provides control over network based traffic based on IP addresses, ports, and protocols, whereas WAF narrows control over HTTP traffic tailored more towards behavior of web applications.
Sigma rules doesn’t has out of the box support for WAF rules explicitly. There are some rules inside proxy_generic and webserver_generic category which upon initial search seems can be filtered for WAF category. So the aim of this discussion is to identify the rules scattered across different categories that fit WAF criteria.

The intent of this discussion is not to dive deep into the role of the WAFs, but to make sure that the important rules that span WAF attacks relevant to SIEM can be identified from existing SIGMA repo.

Major Sigma rules to be added across categories:

  1. Cross-site / Server-side Request Forgery (CSRF/SSRF): Potential CVE-2023-25717 Exploitation Attempt - Remote Code Execution via an unauthenticated HTTP GET Request (derived from CVE)
  2. Cross-site-scripting (XSS): Cross Site Scripting Strings
  3. SQL Injection (SQi): SQL Injection Strings In URI
  4. Suspicious User Agent: Suspicious User-Agents Related To Recon Tools
  5. OS Command Injection: CVE-2021-22123 exploitation - attempt against Fortinet WAFs (derived from CVE)

What alternatives have you considered?
Sigma rules are not exhaustive for all WAF use-cases and these can be further improved by introducing more use-cases like rules related to AWS WAF, etc

Do you have any additional context?
Suggestions are welcome from users for more use-cases.

@sandeshkr419 sandeshkr419 added enhancement New feature or request untriaged labels Sep 13, 2023
@sandeshkr419 sandeshkr419 changed the title [FEATURE] [FEATURE] WAF log type support Sep 13, 2023
@sandeshkr419 sandeshkr419 mentioned this issue Sep 26, 2023
5 tasks
riysaxen-amzn pushed a commit to riysaxen-amzn/security-analytics that referenced this issue Feb 20, 2024
…s page. (opensearch-project#572)

* Add a details button to open the findings flyout from the correlations page. opensearch-project#564

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* Add a details button to open the findings flyout from the correlations page. opensearch-project#564

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* [FEATURE] Add a details button to open the findings flyout from the correlations page. opensearch-project#564

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* fix tests

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* code review

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* code review

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* [BUG] Wrong field mappings for the cloud trail logs opensearch-project#573

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* code review

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

---------

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>
riysaxen-amzn pushed a commit to riysaxen-amzn/security-analytics that referenced this issue Feb 20, 2024
* Wrong field mappings for the cloud trail logs opensearch-project#573

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* [BUG] Wrong field mappings for the cloud trail logs opensearch-project#573

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* [BUG] Wrong field mappings for the cloud trail logs opensearch-project#573

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* code review

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

* code review

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>

---------

Signed-off-by: Jovan Cvetkovic <jovanca.cvetkovic@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request untriaged
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant