No Description

soc-a2-fortigate-fw-rules.xml 3.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. <!--
  2. SOC Proposal Rules — Appendix A2: FortiGate IPS/IDS & Firewall
  3. Simulation profile rule IDs : 100311-100320
  4. Production profile rule IDs : 110311-110320
  5. Severity mapping:
  6. High → level 12
  7. Medium → level 8
  8. Low → level 5
  9. -->
  10. <group name="soc_mvp,appendix_a,a2,fortigate,">
  11. <!-- ── Simulation profile ── -->
  12. <!-- ── Production profile (if_group=fortigate, no soc_mvp_test required) ── -->
  13. <rule id="110311" level="12">
  14. <if_group>fortigate</if_group>
  15. <match>dstport=3389</match>
  16. <match>action="accept"</match>
  17. <description>A2-01 [PROD] FortiGate: RDP (3389) traffic allowed</description>
  18. <group>soc_prod,a2,rdp,</group>
  19. <mitre><id>T1021.001</id></mitre>
  20. </rule>
  21. <rule id="110312" level="12">
  22. <if_group>fortigate</if_group>
  23. <match>action="password-change"</match>
  24. <description>A2-02 [PROD] FortiGate: admin account password changed</description>
  25. <group>soc_prod,a2,admin_change,</group>
  26. <mitre><id>T1098</id></mitre>
  27. </rule>
  28. <rule id="110313" level="12">
  29. <if_group>fortigate</if_group>
  30. <match>action="create-admin"</match>
  31. <description>A2-03 [PROD] FortiGate: new admin account created</description>
  32. <group>soc_prod,a2,admin_change,</group>
  33. <mitre><id>T1136</id></mitre>
  34. </rule>
  35. <rule id="110314" level="12">
  36. <if_group>fortigate</if_group>
  37. <match>action="config-change"</match>
  38. <match>config_value=disable</match>
  39. <description>A2-04 [PROD] FortiGate: alerting/notification disabled via config change</description>
  40. <group>soc_prod,a2,defense_evasion,</group>
  41. <mitre><id>T1562</id></mitre>
  42. </rule>
  43. <rule id="110315" level="5">
  44. <if_group>fortigate</if_group>
  45. <match>action="download-config"</match>
  46. <description>A2-05 [PROD] FortiGate: firewall configuration file downloaded</description>
  47. <group>soc_prod,a2,config,</group>
  48. <mitre><id>T1005</id></mitre>
  49. </rule>
  50. <rule id="110316" level="8">
  51. <if_group>fortigate</if_group>
  52. <match>subtype="ips"</match>
  53. <match>attack="Multiple.Critical</match>
  54. <description>A2-06 [PROD] FortiGate IPS: multiple critical signatures triggered</description>
  55. <group>soc_prod,a2,ips,</group>
  56. <mitre><id>T1595</id></mitre>
  57. </rule>
  58. <rule id="110317" level="5">
  59. <if_group>fortigate</if_group>
  60. <match>subtype="anomaly"</match>
  61. <match>attack="TCP.Port.Scan"</match>
  62. <description>A2-07 [PROD] FortiGate: TCP port scan from external IP</description>
  63. <group>soc_prod,a2,recon,</group>
  64. <mitre><id>T1046</id></mitre>
  65. </rule>
  66. <rule id="110318" level="8">
  67. <if_group>fortigate</if_group>
  68. <match>subtype="ips"</match>
  69. <match>ioc_type=ip</match>
  70. <description>A2-08 [PROD] FortiGate IPS: IOC-based IP indicator detected</description>
  71. <group>soc_prod,a2,ioc,</group>
  72. <mitre><id>T1071.001</id></mitre>
  73. </rule>
  74. <rule id="110319" level="8">
  75. <if_group>fortigate</if_group>
  76. <match>subtype="anomaly"</match>
  77. <match>attack="Internal.Port.Scan"</match>
  78. <description>A2-09 [PROD] FortiGate: internal port scan from private source IP</description>
  79. <group>soc_prod,a2,recon,</group>
  80. <mitre><id>T1046</id></mitre>
  81. </rule>
  82. <rule id="110320" level="8">
  83. <if_group>fortigate</if_group>
  84. <match>threat_label="known-c2"</match>
  85. <description>A2-10 [PROD] FortiGate: traffic to known C2/malicious IP allowed</description>
  86. <group>soc_prod,a2,ioc,c2,</group>
  87. <mitre><id>T1071.001</id></mitre>
  88. </rule>
  89. </group>