mirror of
https://github.com/falcosecurity/falco.git
synced 2025-08-09 01:58:13 +00:00
rule update: add placeholder for rules write below root/etc
Signed-off-by: kaizhe <derek0405@gmail.com>
This commit is contained in:
parent
f4fea8441c
commit
8ed33a04fd
@ -1148,6 +1148,10 @@
|
|||||||
- macro: user_known_write_etc_conditions
|
- macro: user_known_write_etc_conditions
|
||||||
condition: proc.name=confd
|
condition: proc.name=confd
|
||||||
|
|
||||||
|
# This is a placeholder for user to extend the whitelist for write below etc rule
|
||||||
|
- macro: user_know_write_below_etc_activities
|
||||||
|
condition: (never_true)
|
||||||
|
|
||||||
- macro: write_etc_common
|
- macro: write_etc_common
|
||||||
condition: >
|
condition: >
|
||||||
etc_dir and evt.dir = < and open_write
|
etc_dir and evt.dir = < and open_write
|
||||||
@ -1245,6 +1249,7 @@
|
|||||||
and not checkpoint_writing_state
|
and not checkpoint_writing_state
|
||||||
and not jboss_in_container_writing_passwd
|
and not jboss_in_container_writing_passwd
|
||||||
and not etcd_manager_updating_dns
|
and not etcd_manager_updating_dns
|
||||||
|
and not user_know_write_below_etc_activities
|
||||||
|
|
||||||
- rule: Write below etc
|
- rule: Write below etc
|
||||||
desc: an attempt to write to any file below /etc
|
desc: an attempt to write to any file below /etc
|
||||||
@ -1308,6 +1313,10 @@
|
|||||||
- macro: user_known_write_root_conditions
|
- macro: user_known_write_root_conditions
|
||||||
condition: fd.name=/root/.bash_history
|
condition: fd.name=/root/.bash_history
|
||||||
|
|
||||||
|
# This is a placeholder for user to extend the whitelist for write below root rule
|
||||||
|
- macro: user_known_write_below_root_activities
|
||||||
|
condition: (never_true)
|
||||||
|
|
||||||
- rule: Write below root
|
- rule: Write below root
|
||||||
desc: an attempt to write to any file directly below / or /root
|
desc: an attempt to write to any file directly below / or /root
|
||||||
condition: >
|
condition: >
|
||||||
@ -1329,6 +1338,7 @@
|
|||||||
and not rancher_writing_root
|
and not rancher_writing_root
|
||||||
and not known_root_conditions
|
and not known_root_conditions
|
||||||
and not user_known_write_root_conditions
|
and not user_known_write_root_conditions
|
||||||
|
and not user_known_write_below_root_activities
|
||||||
output: "File below / or /root opened for writing (user=%user.name command=%proc.cmdline parent=%proc.pname file=%fd.name program=%proc.name container_id=%container.id image=%container.image.repository)"
|
output: "File below / or /root opened for writing (user=%user.name command=%proc.cmdline parent=%proc.pname file=%fd.name program=%proc.name container_id=%container.id image=%container.image.repository)"
|
||||||
priority: ERROR
|
priority: ERROR
|
||||||
tags: [filesystem, mitre_persistence]
|
tags: [filesystem, mitre_persistence]
|
||||||
@ -1470,12 +1480,18 @@
|
|||||||
- list: user_known_change_thread_namespace_binaries
|
- list: user_known_change_thread_namespace_binaries
|
||||||
items: []
|
items: []
|
||||||
|
|
||||||
|
- macro: user_know_change_thread_namespace_activities
|
||||||
|
condition: (never_true)
|
||||||
|
|
||||||
- list: network_plugin_binaries
|
- list: network_plugin_binaries
|
||||||
items: [aws-cni, azure-vnet]
|
items: [aws-cni, azure-vnet]
|
||||||
|
|
||||||
- macro: calico_node
|
- macro: calico_node
|
||||||
condition: (container.image.repository endswith calico/node and proc.name=calico-node)
|
condition: (container.image.repository endswith calico/node and proc.name=calico-node)
|
||||||
|
|
||||||
|
- macro: weaveworks_scope
|
||||||
|
condition: (container.image.repository endswith weaveworks/scope and proc.name=scope)
|
||||||
|
|
||||||
- rule: Change thread namespace
|
- rule: Change thread namespace
|
||||||
desc: >
|
desc: >
|
||||||
an attempt to change a program/thread\'s namespace (commonly done
|
an attempt to change a program/thread\'s namespace (commonly done
|
||||||
@ -1494,6 +1510,8 @@
|
|||||||
and not rancher_agent
|
and not rancher_agent
|
||||||
and not rancher_network_manager
|
and not rancher_network_manager
|
||||||
and not calico_node
|
and not calico_node
|
||||||
|
and not weaveworks_scope
|
||||||
|
and not user_know_change_thread_namespace_activities
|
||||||
output: >
|
output: >
|
||||||
Namespace change (setns) by unexpected program (user=%user.name command=%proc.cmdline
|
Namespace change (setns) by unexpected program (user=%user.name command=%proc.cmdline
|
||||||
parent=%proc.pname %container.info container_id=%container.id image=%container.image.repository)
|
parent=%proc.pname %container.info container_id=%container.id image=%container.image.repository)
|
||||||
@ -1703,7 +1721,7 @@
|
|||||||
# In this file, it just takes one of the images in trusted_containers
|
# In this file, it just takes one of the images in trusted_containers
|
||||||
# and repeats it.
|
# and repeats it.
|
||||||
- macro: user_trusted_containers
|
- macro: user_trusted_containers
|
||||||
condition: (container.image.repository = docker.io/sysdig/agent)
|
condition: (container.image.repository endswith sysdig/agent)
|
||||||
|
|
||||||
- list: sematext_images
|
- list: sematext_images
|
||||||
items: [docker.io/sematext/sematext-agent-docker, docker.io/sematext/agent, docker.io/sematext/logagent,
|
items: [docker.io/sematext/sematext-agent-docker, docker.io/sematext/agent, docker.io/sematext/logagent,
|
||||||
@ -1735,7 +1753,7 @@
|
|||||||
# In this file, it just takes one of the images in falco_privileged_images
|
# In this file, it just takes one of the images in falco_privileged_images
|
||||||
# and repeats it.
|
# and repeats it.
|
||||||
- macro: user_privileged_containers
|
- macro: user_privileged_containers
|
||||||
condition: (container.image.repository = docker.io/sysdig/agent)
|
condition: (container.image.repository endswith sysdig/agent)
|
||||||
|
|
||||||
- list: rancher_images
|
- list: rancher_images
|
||||||
items: [
|
items: [
|
||||||
|
Loading…
Reference in New Issue
Block a user