
Summary
The rule 'Orca Passthrough' is designed to re-raise alerts generated by Orca Security in the Panther logging framework. With a medium severity rating, this rule is intended to enhance visibility into security issues detected by Orca by forwarding these alerts into Panther’s system for further processing and correlation. The rule operates on various log types, particularly 'Orca.Alert', and uses a deduplication period set to 1440 minutes to minimize redundancy in alerts raised within that timeframe. By linking alerts back to specific details—like alert labels, asset names, and unique state identifiers—this rule provides a pipeline for traffic from Orca to Panther, ensuring that critical adjustments or responses can be promptly engineered. This rule is supported by a reference to Orca's documentation and employs specific tags for organization like 'Orca' and 'Passthrough'. Its testing strategy involves checking alerts for multiple security issues such as weak hash algorithms and network misconfigurations in AWS, notably concerning SSH logins, which are prone to brute-force attacks if password authentication is enabled, therefore illustrating the necessity of this rule in maintaining robust security monitoring and assessment capabilities.
Categories
- Cloud
- AWS
- Kubernetes
- Containers
- Application
Data Sources
- Web Credential
- Logon Session
- Application Log
ATT&CK Techniques
- T1537
- T1110
Created: 2025-04-15