-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Filebeat]Cloudtrail: parse consoleLogin additional data #16110
Labels
Comments
Pinging @elastic/siem (Team:SIEM) |
4 tasks
leehinman
added a commit
to leehinman/beats
that referenced
this issue
Mar 20, 2020
- sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type - sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id - sessionIssuer.userName -> user.name - sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn - sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id - add aws.cloudtrail.console_login.additional_eventdata.mobile_version - add aws.cloudtrail.console_login.additional_eventdata.login_to - add aws.cloudtrail.console_login.additional_eventdata.mfa_used - copy source.address to source.ip if value is an IP address Closes elastic#16086 Closes elastic#16110
leehinman
added a commit
that referenced
this issue
Mar 23, 2020
* Improve AWS cloudtrail field mappings - sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type - sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id - sessionIssuer.userName -> user.name - sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn - sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id - add aws.cloudtrail.console_login.additional_eventdata.mobile_version - add aws.cloudtrail.console_login.additional_eventdata.login_to - add aws.cloudtrail.console_login.additional_eventdata.mfa_used - copy source.address to source.ip if value is an IP address Closes #16086 Closes #16110
4 tasks
leehinman
added a commit
to leehinman/beats
that referenced
this issue
Mar 23, 2020
* Improve AWS cloudtrail field mappings - sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type - sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id - sessionIssuer.userName -> user.name - sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn - sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id - add aws.cloudtrail.console_login.additional_eventdata.mobile_version - add aws.cloudtrail.console_login.additional_eventdata.login_to - add aws.cloudtrail.console_login.additional_eventdata.mfa_used - copy source.address to source.ip if value is an IP address Closes elastic#16086 Closes elastic#16110 (cherry picked from commit 57e194b)
leehinman
added a commit
that referenced
this issue
Mar 23, 2020
* Improve AWS cloudtrail field mappings - sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type - sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id - sessionIssuer.userName -> user.name - sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn - sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id - add aws.cloudtrail.console_login.additional_eventdata.mobile_version - add aws.cloudtrail.console_login.additional_eventdata.login_to - add aws.cloudtrail.console_login.additional_eventdata.mfa_used - copy source.address to source.ip if value is an IP address Closes #16086 Closes #16110 (cherry picked from commit 57e194b)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the enhancement:
In order to capture users login without MFA and create an alert on it, we'd need to parse the
additionalEventData
field from cloudtrail logs when the eventName isconsoleLogin
RefThe resulting field would look like
aws.cloudtrail.console_login.additional_eventdata.mfa_used
Based on a discussion with @leehinman we could extend this to something more generic for specific
eventName
where parsingrequest_parameters
,response_elements
oradditional_eventdata
makes senseThe text was updated successfully, but these errors were encountered: