
Summary
This detection rule identifies instances of error-level audit events generated by CyberArk's Privileged Access Security (PAS) system. It leverages the error codes that correlate with the CyberArk Vault Audit Action Codes. The query specifies that it looks for events in the 'cyberarkpas.audit' dataset with an event type of 'error' occurring within the last 30 minutes. This rule is essential for organizations using CyberArk PAS as it helps monitor potentially malicious activities, especially those related to unauthorized privilege escalation attempts or initial access through valid accounts. With a risk score of 73, this rule is categorized under high severity to ensure prompt attention to detected anomalies. The integration requires data from sources such as 'filebeat-*' and 'logs-cyberarkpas.audit*', and it's vital to configure any necessary exceptions to minimize false alerts. Organizations are encouraged to consult CyberArk documentation for further details on interpreting specific audit event codes.
Categories
- Identity Management
- Cloud
- On-Premise
Data Sources
- File
- Application Log
ATT&CK Techniques
- T1078
Created: 2021-06-23