heroui logo

Tracebit Alert

Panther Rules

View Source
Summary
The Tracebit Alert detection rule is designed to monitor and respond to suspicious activities surrounding security canaries across an organization's various cloud environments, including AWS, Azure, and Okta. These canaries serve as alerts for unauthorized or unexpected access to sensitive resources. The rule triggers when there is evidence of interaction with a canary, indicating a potential security breach. Several tests are detailed within this rule; they evaluate specific operations such as accessing AWS canaries, using canary credentials, and accessing Azure and Okta resources. Each test generates an alert with relevant logs, including operational details, resource IDs, and principal user information, ensuring comprehensive monitoring of events that could signify compromised security. The severity of alerts ranges from medium to high, depending on the context of the detected activity, and is vital for incident response teams to act promptly in mitigating any potential threats.
Categories
  • Cloud
  • AWS
  • Azure
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
Created: 2025-01-24