<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check for snapshot taken using programmatic access in Prisma Cloud Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/280483#M185</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/118903"&gt;@APaul&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking into CloudTrail's options for the type field, I don't see an option for "Consolepassword" :&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-user-identity.html#cloudtrail-event-reference-user-identity-fields" target="_blank"&gt;https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-user-identity.html#cloudtrail-event-reference-user-identity-fields&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All types though do not differentiate consoel vs. API operation, just where did it come from, i.e. other account, AD, IAM, assumed role etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think using JSON rule for eventtype might be more beneficial. More info on AWS page, look for eventType:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-record-contents.html" target="_blank"&gt;https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-record-contents.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;AwsApiCall&lt;/STRONG&gt; – An API was called.&lt;/P&gt;&lt;P&gt;AwsServiceEvent – The service generated an event related to your trail. For example, this can occur when another account made a call with a resource that you own.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;AwsConsoleSignin&lt;/STRONG&gt; – A user in your account (root, IAM, federated, SAML, or SwitchRole) signed in to the AWS Management Console.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So consider doing:&lt;/P&gt;&lt;PRE&gt;event where cloud.type = 'aws' AND operation = 'CreateInstanceSnapshot' AND json.rule = $.eventType = "AwsApiCall"&lt;/PRE&gt;&lt;P&gt;In addition, you can add a filter to include specific email addresses with MATCHES or excluding specific known users from the output.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did that help?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 01 Aug 2019 08:47:34 GMT</pubDate>
    <dc:creator>SRohatyn</dc:creator>
    <dc:date>2019-08-01T08:47:34Z</dc:date>
    <item>
      <title>Check for snapshot taken using programmatic access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/280462#M184</link>
      <description>&lt;P&gt;I need to write a query to check for events of a snapshot taken using programmatic access :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;event where cloud.type = 'aws' AND operation = 'CreateInstanceSnapshot' AND json.rule = $.userIdentity.type = "Consolepassword"&lt;/PRE&gt;&lt;P&gt;Till now I have tried to do this, and I am pretty sure "&lt;STRONG&gt;json.rule = $.userIdentity.type = "Consolepassword&lt;/STRONG&gt;" is 100% incorrect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need help on the second part to check if the user is using programmatic access or console access to take a snapshot.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 17:17:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/280462#M184</guid>
      <dc:creator>APaul</dc:creator>
      <dc:date>2020-09-02T17:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: Check for snapshot taken using programmatic access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/280483#M185</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/118903"&gt;@APaul&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking into CloudTrail's options for the type field, I don't see an option for "Consolepassword" :&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-user-identity.html#cloudtrail-event-reference-user-identity-fields" target="_blank"&gt;https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-user-identity.html#cloudtrail-event-reference-user-identity-fields&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All types though do not differentiate consoel vs. API operation, just where did it come from, i.e. other account, AD, IAM, assumed role etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think using JSON rule for eventtype might be more beneficial. More info on AWS page, look for eventType:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-record-contents.html" target="_blank"&gt;https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-record-contents.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;AwsApiCall&lt;/STRONG&gt; – An API was called.&lt;/P&gt;&lt;P&gt;AwsServiceEvent – The service generated an event related to your trail. For example, this can occur when another account made a call with a resource that you own.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;AwsConsoleSignin&lt;/STRONG&gt; – A user in your account (root, IAM, federated, SAML, or SwitchRole) signed in to the AWS Management Console.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So consider doing:&lt;/P&gt;&lt;PRE&gt;event where cloud.type = 'aws' AND operation = 'CreateInstanceSnapshot' AND json.rule = $.eventType = "AwsApiCall"&lt;/PRE&gt;&lt;P&gt;In addition, you can add a filter to include specific email addresses with MATCHES or excluding specific known users from the output.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did that help?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 08:47:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/280483#M185</guid>
      <dc:creator>SRohatyn</dc:creator>
      <dc:date>2019-08-01T08:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: Check for snapshot taken using programmatic access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/281053#M186</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/117130"&gt;@SRohatyn&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot for your valuable inputs and related reference links. I am able to get the result with little modification.&lt;/P&gt;&lt;PRE&gt;event where cloud.type = 'aws' AND operation = 'CreateSnapshot' AND json.rule != (( $.userAgent = 'signin.amazonaws.com' ) OR ($.userAgent = 'console.amazonaws.com' ))&lt;/PRE&gt;&lt;P&gt;This is giving me the desired results. A big thanks for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 07:34:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/281053#M186</guid>
      <dc:creator>APaul</dc:creator>
      <dc:date>2019-08-05T07:34:29Z</dc:date>
    </item>
    <item>
      <title>Re: Check for snapshot taken using programmatic access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/281054#M187</link>
      <description>&lt;P&gt;You're very welcome. Thanks for the update with what works for you.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 07:37:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/check-for-snapshot-taken-using-programmatic-access/m-p/281054#M187</guid>
      <dc:creator>SRohatyn</dc:creator>
      <dc:date>2019-08-05T07:37:17Z</dc:date>
    </item>
  </channel>
</rss>

