heroui logo

Snyk Org Settings

Panther Rules

View Source
Summary
The Snyk Org Settings detection rule is designed to monitor changes made to the settings of Snyk Organizations, such as integrations and webhooks. This rule is crucial as unauthorized or erroneous changes could lead to security vulnerabilities or misconfigurations. The detection relies on specific audit logs, namely Snyk.GroupAudit and Snyk.OrgAudit, which contain information about changes made to organization settings. The rule is set to trigger upon a successful change that meets certain criteria, particularly focusing on events where integration settings are modified. The rule includes a deduplication period of 60 minutes to avoid excessive alerts correlated with the same change and maintains a threshold of 1, indicating that even a single change will trigger the rule. The severity of this rule is classified as medium, reflecting the importance of monitoring these settings without overwhelming the alerting system. The rule includes detailed structure for examining logs before and after the change to ensure that only meaningful alterations are flagged.
Categories
  • Cloud
  • Application
  • Identity Management
Data Sources
  • Script
  • Application Log
Created: 2023-04-26