def check_ssh_brute_force()

in security_hub_correlation_cdk/lambdas/create_sh_finding/create_sh_finding.py [0:0]


def check_ssh_brute_force(sh_resource, ddbtable):
    ssh_brute_force = 'TTPs/Initial Access/UnauthorizedAccess:EC2-SSHBruteForce'
    try:
        ssh_brute_force_payload = ddbtable.query(
        IndexName= DYNAMODB_GSI_TYPE,
        KeyConditionExpression=Key('ResourceId').eq(sh_resource) & Key('Types').eq(ssh_brute_force)
        )
        if ssh_brute_force_payload['Count'] >= 1:
            logger.info('Found GuardDuty SSH Brute force for {}.'.format(sh_resource))
            return ssh_brute_force_payload
    except ClientError as error_handle:
        logger.error(error_handle.dynamodb_match['Error']['Code'])