[Rule Tunings] AWS Role Assumption By Service / User #4827
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request
Issue link(s):
https://github.com/elastic/ia-trade-team/issues/616
Summary - What I changed
AWS Role Assumption By Service
The newest versions of this rule seem fine in telemetry and the rule executes as expected
AWS Role Assumption By User
This rule seem fine in telemetry and the rule executes as expected
cloud.account.id
to new_terms field to account for duplicate user.names across cloud accountsaws.cloudtrail.resources.arn
, which gives the same result and remains consistent with the other rule.How To Test
script for AWS Role Assumption by Service
script for AWS Role Assumption by User
To test either of these rules manually you'll need to use the
AssumeRole
API to assume a role using either a role, a user account, or a service like EC2 or Lambda. All of these will need a trust policy attached to the target role you're attempting to assume which allows for your user or service to assume it. You'll also need to attach an inline policy to your user account, role or service to allow thests:AssumeRole
action against the target role. The test scripts set up new roles and all the appropriate trust policies and IAM policies.