
Summary
This detection rule identifies the creation of an API key within the CrowdStrike platform, which may indicate unusual or unauthorized activity if not expected. The rule is enabled and operates based on logs generated by CrowdStrike's Event Streams, specifically targeting the event where a user creates an API client. The rule is designed to trigger if a specific API key creation event occurs within a defined timeframe, thereby allowing for the proactive monitoring of API key activities. Remedial actions suggested in the runbook involve contacting the user associated with the key creation to confirm whether the activity was authorized, particularly since the threshold for detection is set to one event and will deduplicate alerts for 60 minutes to reduce noise. As such, this rule is crucial in monitoring for changes in API access that could potentially lead to security breaches or unauthorized data access.
Categories
- Cloud
- Application
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1098.001
Created: 2024-07-15