heroui logo

Cisco Local Accounts

Sigma Rules

View Source
Summary
This detection rule targets Cisco network devices and examines the local account management practices within the AAA (Authentication, Authorization, and Accounting) service. Specifically, it identifies the creation or modification of local accounts and the configurations for remote authentication. Attackers often exploit local accounts for maintaining unauthorized access (an aspect of persistence), so monitoring changes in local account settings is crucial in a defensive strategy. The rule utilizes specific keywords like 'username' and 'aaa' to identify relevant events in the log source, effectively filtering for potentially suspicious activity. The rule is labeled with high severity due to the critical nature of local account management in securing network devices. False positives may occur in environments with stable remote authentication configurations, where infrequent changes to local accounts are expected. It is essential for security teams to closely monitor these logs, review configuration changes, and ensure compliance with access policies to prevent unauthorized access to sensitive network resources.
Categories
  • Network
  • Infrastructure
  • Endpoint
Data Sources
  • Network Traffic
  • Application Log
  • Active Directory
  • Service
Created: 2019-08-12