The creation, deletion, or alteration of firewall rules to allow or block specific network traffic. Monitoring changes to these rules is critical for detecting misconfigurations, unauthorized access, or malicious attempts to bypass network protections. Examples:
This data component can be collected through the following measures:
Cloud Control Plane
az network firewall policy rule-collection-group rule-collection list --policy-name <policy-name>AuthorizeSecurityGroupIngress or RevokeSecurityGroupIngress actions.aws ec2 describe-security-groupsgcloud compute firewall-rules list --format=jsonHost-Based Firewalls
Get-NetFirewallRule -PolicyStore PersistentStoreiptables -L -vauditctl -w /etc/iptables.rules -p wasudo pfctl -srSIEM Integration
API Monitoring
| Name | Channel |
|---|---|
| AWS:CloudTrail | AuthorizeSecurityGroupIngress |
| AWS:CloudTrail | Create egress rule allowing UDP to port 53, 123, 11211 |
| AWS:CloudTrail | Ingress rule creation or modification for security group |
| AWS:CloudTrail | New security group created with permissive rules |
| esxi:hostd | vSphere API calls modifying firewall settings |
| Firewall Audit Logs | Config Change |
| Firewall Audit Logs | Outbound NAT Rule Changes |
| linux:syslog | iptables or nftables rule changes |
| networkdevice:cli | firewall disable commands or suspicious ACL modifications |
| networkdevice:Firewall | update_rule: Access control or NAT rule modified or disabled outside maintenance window |
| NSM:Firewall | Policy Change / Rule Update |
| NSM:Firewall | rule_modification: New or modified firewall rules related to wireless interfaces |
| WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall | new rule allowing inbound or outbound connections for remote desktop software |
| WinEventLog:Security | Firewall Rule Modification |