Skip to content

Commit

Permalink
Fixed the link numbers in severity_scoring.md
Browse files Browse the repository at this point in the history
  • Loading branch information
Frichetten committed Dec 11, 2023
1 parent 980b141 commit 1e1c9c7
Showing 1 changed file with 9 additions and 4 deletions.
13 changes: 9 additions & 4 deletions content/en/security/severity_scoring.md
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ To explain how the framework is used here are a few examples.

#### Example 1: SNS Topic should have access restrictions set for subscription

The detection rule for [SNS Topic should have access restrictions set for subscription][14] checks if the SNS topic has a resource-based policy that contains a `Principal` of `*`, and an `Action` with the `sns:Subscribe` permission. This combination would allow anyone the ability to subscribe to the SNS topic and receive its notifications. We score this rule as follows:
The detection rule for [SNS Topic should have access restrictions set for subscription][1] checks if the SNS topic has a resource-based policy that contains a `Principal` of `*`, and an `Action` with the `sns:Subscribe` permission. This combination would allow anyone the ability to subscribe to the SNS topic and receive its notifications. We score this rule as follows:

Check notice on line 66 in content/en/security/severity_scoring.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/security/severity_scoring.md#L66

[Datadog.sentencelength] Try to keep your sentence length to 25 words or fewer.
Raw output
{"message": "[Datadog.sentencelength] Try to keep your sentence length to 25 words or fewer.", "location": {"path": "content/en/security/severity_scoring.md", "range": {"start": {"line": 66, "column": 1}}}, "severity": "INFO"}

Check warning on line 66 in content/en/security/severity_scoring.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/security/severity_scoring.md#L66

[Datadog.pronouns] Avoid first-person pronouns such as 'We'.
Raw output
{"message": "[Datadog.pronouns] Avoid first-person pronouns such as 'We'.", "location": {"path": "content/en/security/severity_scoring.md", "range": {"start": {"line": 66, "column": 342}}}, "severity": "WARNING"}

- Likelihood: Critical
- Attack Vector: No Authorization
Expand All @@ -79,16 +79,21 @@ The detection rule for [SNS Topic should have access restrictions set for subscr

#### Example 2: EC2 instances should enforce IMDSv2

Check warning on line 80 in content/en/security/severity_scoring.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/security/severity_scoring.md#L80

[Datadog.headings] 'Example 2: EC2 instances should enforce IMDSv2' should use sentence-style capitalization.
Raw output
{"message": "[Datadog.headings] 'Example 2: EC2 instances should enforce IMDSv2' should use sentence-style capitalization.", "location": {"path": "content/en/security/severity_scoring.md", "range": {"start": {"line": 80, "column": 6}}}, "severity": "WARNING"}

The detection rule for [EC2 instances should enforce IMDSv2][15] checks if an EC2 instance is using the instance metadata service version 1 ([IMDSv1][16]), which is vulnerable to common web application attacks. If exploited, an adversary would be able to access the IAM credentials stored in the IMDS and use them to access resources in the AWS account. We score this rule as follows:
The detection rule for [EC2 instances should enforce IMDSv2][2] checks if an EC2 instance is using the instance metadata service version 1 ([IMDSv1][3]), which is vulnerable to common web application attacks. If exploited, an adversary would be able to access the IAM credentials stored in the IMDS and use them to access resources in the AWS account. We score this rule as follows:

Check notice on line 82 in content/en/security/severity_scoring.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/security/severity_scoring.md#L82

[Datadog.sentencelength] Try to keep your sentence length to 25 words or fewer.
Raw output
{"message": "[Datadog.sentencelength] Try to keep your sentence length to 25 words or fewer.", "location": {"path": "content/en/security/severity_scoring.md", "range": {"start": {"line": 82, "column": 1}}}, "severity": "INFO"}

Check notice on line 82 in content/en/security/severity_scoring.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/security/severity_scoring.md#L82

[Datadog.sentencelength] Try to keep your sentence length to 25 words or fewer.
Raw output
{"message": "[Datadog.sentencelength] Try to keep your sentence length to 25 words or fewer.", "location": {"path": "content/en/security/severity_scoring.md", "range": {"start": {"line": 82, "column": 210}}}, "severity": "INFO"}

Check warning on line 82 in content/en/security/severity_scoring.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/security/severity_scoring.md#L82

[Datadog.pronouns] Avoid first-person pronouns such as 'We'.
Raw output
{"message": "[Datadog.pronouns] Avoid first-person pronouns such as 'We'.", "location": {"path": "content/en/security/severity_scoring.md", "range": {"start": {"line": 82, "column": 353}}}, "severity": "WARNING"}

- Likelihood: Medium
- Attack Vector: Vulnerability
- The Attack Vector is marked as "Vulnerability". This is because the exploitation of this misconfiguration requires the resource to contain a vulnerable component, such as vulnerable software running on the EC2 instance that can be abused to perform [server side request forgery][17].
- The Attack Vector is marked as "Vulnerability". This is because the exploitation of this misconfiguration requires the resource to contain a vulnerable component, such as vulnerable software running on the EC2 instance that can be abused to perform [server side request forgery][4].
- Accessibility: Private
- The Accessibility is marked as "Private" because the EC2 instance has not explicitly been made public.

- Impact: Medium
- Impact is marked as "Medium" due to the impacts to the confidentiality of the EC2 instance. An adversary would be able to access the IMDS and potentially pull IAM credentials associated with the resource.

- Severity Score: Medium x Medium = Medium
- The final severity score is Medium. This is because a Medium likelihood mixed with a Medium impact results in an overall score of Medium.
- The final severity score is Medium. This is because a Medium likelihood mixed with a Medium impact results in an overall score of Medium.

[1]: https://docs.datadoghq.com/security/default_rules/aws-sns-subscription/
[2]: https://docs.datadoghq.com/security/default_rules/aws-ec2-imdsv2/
[3]: https://hackingthe.cloud/aws/general-knowledge/intro_metadata_service/
[4]: https://hackingthe.cloud/aws/exploitation/ec2-metadata-ssrf/

0 comments on commit 1e1c9c7

Please sign in to comment.