Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Service Packs & AWS CIS Pack #252

Merged
merged 3 commits into from
Apr 26, 2021
Merged

Service Packs & AWS CIS Pack #252

merged 3 commits into from
Apr 26, 2021

Conversation

wey-chiang
Copy link
Contributor

Closes https://app.asana.com/0/1199940726973121/1200101326773347/f

Background

This PR adds new packs based on the service provider as well as an AWS CIS pack

Changes

  • Added new packs which should have necessary globals included

Testing

Copy link
Contributor

@lindsey-w lindsey-w left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🥳

PackDefinition:
IDs:
- Osquery.Linux.AWSCommandExecuted
- Osquery.Linux.LoginFromNonOffice
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wondering how will we deal with "configuration required" detections? We want to manage them via packs, but should they be enabled with the non-configuration required detections?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Huh, that's a good point -- had not considered the case for configuration required.

It'd be slick if we had a thing in the UI that specifically alerts users to detections requiring configuration

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's a good question, typically we disabled by default detections that had the configuration required tag, but that doesn't make as much sense in the packs world. I think for now we should just include them, and customers will need to know to search for that tag. In the future we might have some CTAs in the UI for these.

- CiscoUmbrella.DNS.Blocked
- CiscoUmbrella.DNS.FuzzyMatching
- CiscoUmbrella.DNS.Suspicious
# Globals used in these detections
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

missing a global or copied comment?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy pasta, left in if we ever add in detections that require globals

packs/cisco_umbrella_dns.yml Outdated Show resolved Hide resolved
Co-authored-by: Lindsey Whitehurst <43453975+lindsey-w@users.noreply.github.com>
PackDefinition:
IDs:
- Osquery.Linux.AWSCommandExecuted
- Osquery.Linux.LoginFromNonOffice
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's a good question, typically we disabled by default detections that had the configuration required tag, but that doesn't make as much sense in the packs world. I think for now we should just include them, and customers will need to know to search for that tag. In the future we might have some CTAs in the UI for these.

@wey-chiang wey-chiang merged commit 74e60d7 into master Apr 26, 2021
@wey-chiang wey-chiang deleted the weyland-2021-q1-packs branch April 26, 2021 16:40
melenevskyi pushed a commit that referenced this pull request Dec 12, 2023
* Sorted testing (#1)

Add command-line argument sort-test-results to panther_analysis_tool
When set,sort-test-results will bucket test results output by passed/errored status, and will sort test cases by Rule ID

* Minor updates - rename variable, conditional print (#2)

* Print passed tests first, followed by failed

* Sort tests by Rule ID

* Add container

* Add container

* Add container

* Add logic to print organized output when a results container is passed.

* Add container

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* Update version

* rename variable. Only print detection ID in setup_run_tests when not sorting test results

* Conditionally print blank lines (#3)

* Conditionally print blank line

* Conditionally print blank line

* Use implied bool arg (#4)

* Conditionally print blank line

* Conditionally print blank line

* Update arg implementation

* Update arg implementation

* Apply diff from Panther (#5)

* Apply diff from panther

* Lint with black (#6)

* lint with black

---------

Co-authored-by: Chris Dzombak <chris@chrisdzombak.net>
Co-authored-by: Evan Gibler <evan.gibler@panther.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants