Addressing Security Risks in Shadow IT and Unauthorized Applications

Identifying and mitigating threats posed by unsanctioned applications and systems within an organization.

0 likes
10 views

Rule Content

{
  "title": "Addressing Security Risks in Shadow IT and Unauthorized Applications",
  "description": "Identifies and mitigates threats posed by unsanctioned applications and systems within an organization.",
  "category": "Security",
  "categoryContext": "Flags unsafe code, secrets, and insecure configurations.",
  "rules": [
    {
      "id": "shadow-it-detection",
      "description": "Detects and flags code that integrates with unauthorized third-party services or APIs.",
      "severity": "High",
      "patterns": [
        {
          "pattern": "fetch\\(['\"]https?://(?!approved-domain\\.com)[^'\"]+['\"]\\)",
          "message": "Usage of unapproved external API detected. Ensure all third-party integrations are authorized."
        },
        {
          "pattern": "import\\s+[^\\s]+\\s+from\\s+['\"](?!approved-library)['\"][^'\"]+['\"]",
          "message": "Importing unapproved external libraries. Verify that all dependencies are sanctioned."
        }
      ]
    },
    {
      "id": "hardcoded-secrets",
      "description": "Identifies hardcoded sensitive information such as API keys, passwords, and tokens.",
      "severity": "Critical",
      "patterns": [
        {
          "pattern": "(?i)(api_key|secret|password)\\s*=\\s*['\"][^'\"]+['\"]",
          "message": "Hardcoded secret detected. Store sensitive information securely using environment variables or secure vaults."
        }
      ]
    },
    {
      "id": "insecure-configurations",
      "description": "Flags configurations that may lead to security vulnerabilities.",
      "severity": "Medium",
      "patterns": [
        {
          "pattern": "DEBUG\\s*=\\s*True",
          "message": "Debug mode is enabled. Disable debug mode in production environments to prevent information leakage."
        },
        {
          "pattern": "ALLOWED_HOSTS\\s*=\\s*\\[\\s*['\"]\\*['\"]\\s*\\]",
          "message": "ALLOWED_HOSTS is set to allow all hosts. Restrict this to specific domains to prevent unauthorized access."
        }
      ]
    },
    {
      "id": "unapproved-dependencies",
      "description": "Detects usage of dependencies that are not approved by the organization.",
      "severity": "High",
      "patterns": [
        {
          "pattern": "require\\(['\"](?!approved-package)['\"][^'\"]+['\"]\\)",
          "message": "Usage of unapproved package detected. Ensure all dependencies are vetted and approved."
        }
      ]
    },
    {
      "id": "unauthorized-network-requests",
      "description": "Flags network requests to unapproved domains.",
      "severity": "High",
      "patterns": [
        {
          "pattern": "axios\\.get\\(['\"]https?://(?!approved-domain\\.com)[^'\"]+['\"]\\)",
          "message": "Network request to unapproved domain detected. Verify that all external communications are authorized."
        }
      ]
    }
  ]
}