You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Determines which cloud provider the service is in order to direct to the correct enrichment.
@@ -50,7 +50,7 @@ tasks:
50
50
'#default#':
51
51
- "4"
52
52
AWS:
53
-
- "8"
53
+
- "10"
54
54
GCP:
55
55
- "9"
56
56
Azure:
@@ -130,10 +130,10 @@ tasks:
130
130
isautoswitchedtoquietmode: false
131
131
"4":
132
132
id: "4"
133
-
taskid: ed351bc8-42f2-4168-8623-e0573f6911e5
133
+
taskid: 2130db27-44cb-4de8-8b9e-45ca3c14c404
134
134
type: title
135
135
task:
136
-
id: ed351bc8-42f2-4168-8623-e0573f6911e5
136
+
id: 2130db27-44cb-4de8-8b9e-45ca3c14c404
137
137
version: -1
138
138
name: Completed
139
139
type: title
@@ -146,7 +146,7 @@ tasks:
146
146
{
147
147
"position": {
148
148
"x": 450,
149
-
"y": 790
149
+
"y": 860
150
150
}
151
151
}
152
152
note: false
@@ -158,10 +158,10 @@ tasks:
158
158
isautoswitchedtoquietmode: false
159
159
"6":
160
160
id: "6"
161
-
taskid: f0cba2e4-b4de-450d-806a-3145e1ce4999
161
+
taskid: 0280f013-e0ff-41b4-8fed-68d95b3ee6dd
162
162
type: playbook
163
163
task:
164
-
id: f0cba2e4-b4de-450d-806a-3145e1ce4999
164
+
id: 0280f013-e0ff-41b4-8fed-68d95b3ee6dd
165
165
version: -1
166
166
name: Azure - Network Security Group Remediation
167
167
description: |-
@@ -242,10 +242,10 @@ tasks:
242
242
isautoswitchedtoquietmode: false
243
243
"7":
244
244
id: "7"
245
-
taskid: 67959d21-de62-43ad-814b-a2bf61b5a280
245
+
taskid: 072e7951-1e71-4d9e-8972-9bf7324f1d6d
246
246
type: playbook
247
247
task:
248
-
id: 67959d21-de62-43ad-814b-a2bf61b5a280
248
+
id: 072e7951-1e71-4d9e-8972-9bf7324f1d6d
249
249
version: -1
250
250
name: AWS - Unclaimed S3 Bucket Remediation
251
251
description: The playbook will create the unclaimed S3 bucket.
@@ -280,8 +280,8 @@ tasks:
280
280
view: |-
281
281
{
282
282
"position": {
283
-
"x": -200,
284
-
"y": 460
283
+
"x": 220,
284
+
"y": 470
285
285
}
286
286
}
287
287
note: false
@@ -293,10 +293,10 @@ tasks:
293
293
isautoswitchedtoquietmode: false
294
294
"8":
295
295
id: "8"
296
-
taskid: 409f127a-6417-41a9-8c53-e35dbfc32f53
296
+
taskid: 7138c0ac-6cc2-4494-817f-1a5130a79c2a
297
297
type: playbook
298
298
task:
299
-
id: 409f127a-6417-41a9-8c53-e35dbfc32f53
299
+
id: 7138c0ac-6cc2-4494-817f-1a5130a79c2a
300
300
version: -1
301
301
name: AWS - Security Group Remediation v2
302
302
description: This playbook takes in some information about an EC2 instance (ID and public_ip) and with provided port and protocol, determines what security groups on the primary interface of an EC2 instance are over-permissive. It uses an automation to determine what interface on an EC2 instance has an over-permissive security group on, determine which security groups have over-permissive rules and to replace them with a copy of the security group that has only the over-permissive portion removed. Over-permissive is defined as sensitive ports (SSH, RDP, etc) being exposed to the internet via IPv4.
@@ -345,8 +345,8 @@ tasks:
345
345
view: |-
346
346
{
347
347
"position": {
348
-
"x": 230,
349
-
"y": 470
348
+
"x": -120,
349
+
"y": 670
350
350
}
351
351
}
352
352
note: false
@@ -358,10 +358,10 @@ tasks:
358
358
isautoswitchedtoquietmode: false
359
359
"9":
360
360
id: "9"
361
-
taskid: d7ea937a-8db4-4b32-87d9-7f02b626c16d
361
+
taskid: 1100e81a-1ff6-49f4-8f7e-aaf059697952
362
362
type: playbook
363
363
task:
364
-
id: d7ea937a-8db4-4b32-87d9-7f02b626c16d
364
+
id: 1100e81a-1ff6-49f4-8f7e-aaf059697952
365
365
version: -1
366
366
name: GCP - Firewall Remediation
367
367
playbookName: GCP - Firewall Remediation
@@ -447,22 +447,153 @@ tasks:
447
447
quietmode: 0
448
448
isoversize: false
449
449
isautoswitchedtoquietmode: false
450
+
"10":
451
+
id: "10"
452
+
taskid: 6334ec1b-b8f4-4498-84b2-80049ebcc585
453
+
type: condition
454
+
task:
455
+
id: 6334ec1b-b8f4-4498-84b2-80049ebcc585
456
+
version: -1
457
+
name: Is AWSAssumeRoleName Input defined?
458
+
description: Determines which cloud provider the service is in order to direct to the correct enrichment.
459
+
type: condition
460
+
iscommand: false
461
+
brand: ""
462
+
nexttasks:
463
+
'#default#':
464
+
- "8"
465
+
"yes":
466
+
- "11"
467
+
separatecontext: false
468
+
conditions:
469
+
- label: "yes"
470
+
condition:
471
+
- - operator: isNotEmpty
472
+
left:
473
+
value:
474
+
complex:
475
+
root: inputs.AWSAssumeRoleName
476
+
iscontext: true
477
+
continueonerrortype: ""
478
+
view: |-
479
+
{
480
+
"position": {
481
+
"x": -300,
482
+
"y": 440
483
+
}
484
+
}
485
+
note: false
486
+
timertriggers: []
487
+
ignoreworker: false
488
+
skipunavailable: false
489
+
quietmode: 0
490
+
isoversize: false
491
+
isautoswitchedtoquietmode: false
492
+
"11":
493
+
id: "11"
494
+
taskid: ad50baec-b4d2-4969-8933-d60086859a91
495
+
type: playbook
496
+
task:
497
+
id: ad50baec-b4d2-4969-8933-d60086859a91
498
+
version: -1
499
+
name: AWS - Security Group Remediation v2
500
+
description: This playbook takes in some information about an EC2 instance (ID and public_ip) and with provided port and protocol, determines what security groups on the primary interface of an EC2 instance are over-permissive. It uses an automation to determine what interface on an EC2 instance has an over-permissive security group on, determine which security groups have over-permissive rules and to replace them with a copy of the security group that has only the over-permissive portion removed. Over-permissive is defined as sensitive ports (SSH, RDP, etc) being exposed to the internet via IPv4.
501
+
playbookName: AWS - Security Group Remediation v2
502
+
type: playbook
503
+
iscommand: false
504
+
brand: ""
505
+
nexttasks:
506
+
'#none#':
507
+
- "4"
508
+
scriptarguments:
509
+
AWSAssumeArn:
510
+
complex:
511
+
root: alert.asmcloud
512
+
accessor: project
513
+
transformers:
514
+
- operator: FirstArrayElement
515
+
- operator: concat
516
+
args:
517
+
prefix:
518
+
value:
519
+
simple: 'arn:aws:iam::'
520
+
suffix:
521
+
value:
522
+
simple: :role/
523
+
- operator: concat
524
+
args:
525
+
prefix: {}
526
+
suffix:
527
+
value:
528
+
simple: inputs.AWSAssumeRoleName
529
+
iscontext: true
530
+
InstanceID:
531
+
complex:
532
+
root: alert.asmsystemids
533
+
filters:
534
+
- - operator: isEqualString
535
+
left:
536
+
value:
537
+
simple: alert.asmsystemids.type
538
+
iscontext: true
539
+
right:
540
+
value:
541
+
simple: ASSET-ID
542
+
accessor: id
543
+
Port:
544
+
complex:
545
+
root: alert
546
+
accessor: remoteport
547
+
Protocol:
548
+
complex:
549
+
root: alert
550
+
accessor: protocol
551
+
transformers:
552
+
- operator: toLowerCase
553
+
PublicIP:
554
+
complex:
555
+
root: alert
556
+
accessor: remoteip
557
+
separatecontext: true
558
+
continueonerrortype: ""
559
+
loop:
560
+
iscommand: false
561
+
exitCondition: ""
562
+
wait: 1
563
+
max: 100
564
+
view: |-
565
+
{
566
+
"position": {
567
+
"x": -550,
568
+
"y": 670
569
+
}
570
+
}
571
+
note: false
572
+
timertriggers: []
573
+
ignoreworker: false
574
+
skipunavailable: true
575
+
quietmode: 0
576
+
isoversize: false
577
+
isautoswitchedtoquietmode: false
450
578
view: |-
451
579
{
452
580
"linkLabelsPosition": {},
453
581
"paper": {
454
582
"dimensions": {
455
-
"height": 805,
456
-
"width": 1680,
457
-
"x": -200,
583
+
"height": 875,
584
+
"width": 2030,
585
+
"x": -550,
458
586
"y": 50
459
587
}
460
588
}
461
589
}
462
-
inputs: []
590
+
inputs:
591
+
- key: AWSAssumeRoleName
592
+
value: {}
593
+
required: false
594
+
description: If assuming roles for AWS, this is the name of the role to assume (should be the same for all organizations)
0 commit comments