1Password - Changes to firewall rules
| Id | 54e6bb8e-2935-422f-9387-dba1961abfd7 |
| Rulename | 1Password - Changes to firewall rules |
| Description | This will alert when changes have been made to the firewall rules. Once this analytics rule is triggered it will group all related future alerts for upto an hour when all related entities are the same. Ref: https://1password.com/ Ref: https://github.com/securehats/ |
| Severity | Medium |
| Tactics | DefenseEvasion |
| Techniques | T1562 |
| Required data connectors | 1Password |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/1Password/Analytics Rules/1Password - Changes to firewall rules.yaml |
| Version | 1.0.0 |
| Arm template | 54e6bb8e-2935-422f-9387-dba1961abfd7.json |
OnePasswordEventLogs_CL
| where log_source == "auditevents"
| where action == "updatfw"
| where object_type == "account"
| extend
ActorUsername = actor_details.email
, SrcIpAddr = session.ip
suppressionEnabled: false
incidentConfiguration:
createIncident: true
groupingConfiguration:
matchingMethod: AllEntities
lookbackDuration: 1h
reopenClosedIncident: false
enabled: true
requiredDataConnectors:
- dataTypes:
- OnePasswordEventLogs_CL
connectorId: 1Password
relevantTechniques:
- T1562
triggerOperator: gt
version: 1.0.0
queryFrequency: 5m
severity: Medium
subTechniques:
- T1562.007
description: |-
This will alert when changes have been made to the firewall rules. Once this analytics rule is triggered it will group all related future alerts for upto an hour when all related entities are the same.
Ref: https://1password.com/
Ref: https://github.com/securehats/
triggerThreshold: 0
suppressionDuration: 5h
entityMappings:
- fieldMappings:
- columnName: ActorUsername
identifier: FullName
entityType: Account
- fieldMappings:
- columnName: SrcIpAddr
identifier: Address
entityType: IP
name: 1Password - Changes to firewall rules
query: |-
OnePasswordEventLogs_CL
| where log_source == "auditevents"
| where action == "updatfw"
| where object_type == "account"
| extend
ActorUsername = actor_details.email
, SrcIpAddr = session.ip
tactics:
- DefenseEvasion
queryPeriod: 5m
kind: Scheduled
id: 54e6bb8e-2935-422f-9387-dba1961abfd7
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/1Password/Analytics Rules/1Password - Changes to firewall rules.yaml
eventGroupingSettings:
aggregationKind: SingleAlert