elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.92k stars 492 forks source link

[FR] Add additional platforms for MITRE Attack Navigator Filter #3973

Closed shashank-elastic closed 1 month ago

shashank-elastic commented 2 months ago

Repository Feature

Core Repo - (rule management, validation, testing, lib, cicd, etc.)

Problem Description

Currently on the MITRE Attack Navigator we are able to filter from the default platform list such as

_DEFAULT_PLATFORMS = [
    "Azure AD",
    "Containers",
    "Google Workspace",
    "IaaS",
    "Linux",
    "macOS",
    "Network",
    "Office 365",
    "PRE",
    "SaaS",
    "Windows"
]

Referenced in Code here

Expand the list, to have additional platforms such as AWS, OKTA and others

Desired Solution

Considered Alternatives

Additional Context

shashank-elastic commented 2 months ago

I think this is directly tied to the platforms supported in MITRE https://attack.mitre.org/matrices/enterprise/ image

We could check if adding our own filters would make sense @approksiu

shashank-elastic commented 1 month ago

This was tested

image

image

image

However, locally when we build the files, I was able to locate a file dedicated to tags such as okta image

So the steps to get the OKTA related MITRE details are

image

cc @Mikaayenson @approksiu

shashank-elastic commented 1 month ago

The steps have been shared , and we can always do a KT if these are not clear. So closing this issue