Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BugFix - GCP serviceusage.apiKeys.create Privilege Escalation (#66) #1089

Merged
merged 4 commits into from
Feb 7, 2024

Conversation

egibs
Copy link
Contributor

@egibs egibs commented Feb 7, 2024

Background

In the rules where Expressions is used in detection logic, it causes errors if the logs don't have the keypath that should be checked with Expressions. Also, given that the UI can't currently render expressions, for now it is better to write rules without using Expressions

Changes

  • Changed rule to that it doesn't use Expressions

Testing

  • pipenv run panther_analysis_tool test --path rules/gcp_audit_rules/ --filter RuleID="GCP.serviceusage.apiKeys.create.Privilege.Escalation"

* Checking log keypath existence when using Expressions

* BugFix - GCP serviceusage.apiKeys.create Privilege Escalation
@egibs egibs requested review from a team February 7, 2024 21:11
darwayne
darwayne previously approved these changes Feb 7, 2024
@egibs egibs enabled auto-merge (squash) February 7, 2024 21:13
@egibs egibs disabled auto-merge February 7, 2024 21:24
@egibs egibs merged commit e610b38 into main Feb 7, 2024
4 of 6 checks passed
@egibs egibs deleted the egibs-sync-66 branch February 7, 2024 21:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants