
Summary
This detection rule monitors the Snowflake environment for any SQL commands that create or replace users. It targets specific queries logged in the Snowflake account usage query history within a two-hour window. The rule searches for the patterns 'create_user' in the signature and any SQL command that begins with 'create' and includes 'user'. This is crucial for maintaining security as unauthorized creation or modification of user accounts can lead to persistence, privilege escalation, and evasion of defenses by enabling malicious actors to obtain valid permissions within the Snowflake platform.
Categories
- Cloud
- Application
Data Sources
- Application Log
ATT&CK Techniques
- T1078
Created: 2024-05-31