@@ -268,8 +268,8 @@ def does_rule_match_sqli(self, rule):
268
268
sqli_recommended = True
269
269
270
270
if 'application_type_id' in dir (rule ):
271
- if self .dsm .rules ['application_types ' ].has_key (rule .application_type_id ):
272
- if self .dsm .rules ['application_types ' ][rule .application_type_id ].tbuid in self .tbuids :
271
+ if self .dsm .rules ['application_type ' ].has_key (rule .application_type_id ):
272
+ if self .dsm .rules ['application_type ' ][rule .application_type_id ].tbuid in self .tbuids :
273
273
sqli_recommended = True
274
274
275
275
for pattern in self .patterns :
@@ -294,28 +294,38 @@ def analyze_computer(self, ds_computer_id):
294
294
computer = self .dsm .computers [ds_computer_id ]
295
295
sqli_recommendations = []
296
296
297
+ is_aws_instance = False
298
+ aws_instance_id = None
297
299
if 'cloud_instance_id' in dir (computer ) and computer .cloud_instance_id and computer .cloud_instance_id .startswith ('i-' ):
300
+ is_aws_instance = True
301
+ aws_instance_id = computer .cloud_instance_id
302
+ elif 'cloud_object_instance_id' in dir (computer ) and computer .cloud_object_instance_id and computer .cloud_object_instance_id .startswith ('i-' ):
303
+ is_aws_instance = True
304
+ aws_instance_id = computer .cloud_object_instance_id
305
+
306
+ if is_aws_instance :
298
307
# this is an AWS instance
308
+ self ._log ("Computer is an AWS instance" )
299
309
300
310
# check at the policy level
301
- if computer .policy_id :
311
+ if computer .security_profile_id :
302
312
self ._log ("Computer is protected by Deep Security. Checking rules" )
303
313
for rule_type in [
304
- 'application_type ' ,
305
- 'integrity_monitoring ' ,
306
- 'log_inspection ' ,
307
- 'intrusion_prevention ' ,
314
+ 'application_type_ids ' ,
315
+ 'integrity_monitoring_rule_ids ' ,
316
+ 'log_inspection_rule_ids ' ,
317
+ 'intrusion_prevention_rule_ids ' ,
308
318
]:
309
- if self .dsm .policies .has_key (computer .policy_id ):
310
- rule_set = getattr (self .dsm .policies [computer .policy_id ], rule_type )
319
+ if self .dsm .policies .has_key (int ( computer .security_profile_id ) ):
320
+ rule_set = getattr (self .dsm .policies [int ( computer .security_profile_id ) ], rule_type )
311
321
if rule_set and rule_set .has_key ('item' ): # policy has these type of rules applied
312
322
for rule_id in rule_set ['item' ]:
313
323
rule = self .dsm .rules [rule_type .replace ('_rule_ids' , '' )][int (rule_id )]
314
324
if self .does_rule_match_sqli (rule ): sqli_recommendations .append (rule )
315
325
else :
316
- self ._log ("Instance {} has no rules of type {} applied" .format (computer . cloud_instance_id , rule_type ))
326
+ self ._log ("Instance {} has no rules of type {} applied" .format (aws_instance_id , rule_type ))
317
327
else :
318
- self ._log ("Policy {} is not available for analysis" .format (computer .policy_id ))
328
+ self ._log ("Policy {} is not available for analysis" .format (int ( computer .security_profile_id ) ))
319
329
else :
320
330
self ._log ("Deep Security is aware of the instance but is not protecting it with a policy" )
321
331
recommendation = None
@@ -327,7 +337,7 @@ def analyze_computer(self, ds_computer_id):
327
337
for rule_id , rule in rules .items ():
328
338
if self .does_rule_match_sqli (rule ): sqli_recommendations .append (rule )
329
339
else :
330
- self ._log ("There are no rule recommendations for instance {}" .format (computer . cloud_instance_id ))
340
+ self ._log ("There are no rule recommendations for instance {}" .format (aws_instance_id ))
331
341
332
342
if len (sqli_recommendations ) > 1 :
333
343
recommendation = True if len (sqli_recommendations ) > 0 else False
0 commit comments