容器内敏感密钥或密码搜索
编辑容器内敏感密钥或密码搜索
编辑此规则检测使用 grep 和 find 等系统搜索实用程序在容器内搜索私有 SSH 密钥或密码的行为。未经授权访问这些敏感文件可能导致容器环境进一步受损,或促进容器突破到底层主机。
规则类型: eql
规则索引:
- logs-cloud_defend*
严重性: 中等
风险评分: 47
每: 5 分钟运行一次
搜索索引自: now-6m (日期数学格式,另请参见 额外回溯时间
)
每次执行的最大告警数: 100
参考资料:
标签:
- 数据源:Elastic Defend for Containers
- 领域:容器
- 操作系统:Linux
- 用例:威胁检测
- 战术:凭据访问
版本: 2
规则作者:
- Elastic
规则许可证: Elastic License v2
规则查询
编辑process where container.id: "*" and event.type== "start" and (( /*account for tools that execute utilities as a subprocess, in this case the target utility name will appear as a process arg*/ (process.name in ("grep", "egrep", "fgrep") or process.args in ("grep", "egrep", "fgrep")) and process.args : ("*BEGIN PRIVATE*", "*BEGIN OPENSSH PRIVATE*", "*BEGIN RSA PRIVATE*", "*BEGIN DSA PRIVATE*", "*BEGIN EC PRIVATE*", "*pass*", "*ssh*", "*user*") ) or ( /*account for tools that execute utilities as a subprocess, in this case the target utility name will appear as a process arg*/ (process.name in ("find", "locate", "mlocate") or process.args in ("find", "locate", "mlocate")) and process.args : ("*id_rsa*", "*id_dsa*") ))
框架: MITRE ATT&CKTM
-
战术
- 名称:凭据访问
- ID:TA0006
- 参考网址:https://attack.mitre.org/tactics/TA0006/
-
技术
- 名称:不安全的凭据
- ID:T1552
- 参考网址:https://attack.mitre.org/techniques/T1552/
-
子技术
- 名称:文件中的凭据
- ID:T1552.001
- 参考网址:https://attack.mitre.org/techniques/T1552/001/