Skip to content

Commit a866ee7

Browse files
Fix remaining Replace master doc URLs with current (#4441)
1 parent 818467f commit a866ee7

2 files changed

+4
-4
lines changed

rules/integrations/aws/discovery_ec2_userdata_request_for_ec2_instance.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
creation_date = "2024/04/14"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/27"
5+
updated_date = "2025/02/03"
66

77
[rule]
88
author = ["Elastic"]
99
description = """
1010
Identifies discovery request `DescribeInstanceAttribute` with the attribute userData and instanceId in AWS CloudTrail
1111
logs. This may indicate an attempt to retrieve user data from an EC2 instance. Adversaries may use this information to
1212
gather sensitive data from the instance such as hardcoded credentials or to identify potential vulnerabilities. This is
13-
a [New Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule that
13+
a [New Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule that
1414
identifies when `aws.cloudtrail.user_identity.arn` requests the user data for a specific
1515
`aws.cloudtrail.flattened.request_parameters.instanceId` from an EC2 instance in the last 14 days.
1616
"""

rules/integrations/aws/persistence_ec2_route_table_modified_or_deleted.toml

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
creation_date = "2021/06/05"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/01/27"
5+
updated_date = "2025/02/03"
66

77
[rule]
88
author = ["Elastic", "Austin Songer"]
99
description = """
1010
Identifies AWS CloudTrail events where an EC2 route table or association has been modified or deleted. Route table or
1111
association modifications can be used by attackers to disrupt network traffic, reroute communications, or maintain
1212
persistence in a compromised environment. This is a [New
13-
Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule that detects the
13+
Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule that detects the
1414
first instance of this behavior by the `aws.cloudtrail.user_identity.arn` field in the last 10 days.
1515
"""
1616
false_positives = [

0 commit comments

Comments
 (0)