heroui logo

Snowflake Drop Network Policy

Anvilogic Forge

View Source
Summary
This detection rule identifies instances in which a Snowflake network policy is removed from the system within the last two hours. The query examines the account usage query history by filtering for events where the 'event_time' falls within the last two hours and the 'query_text' contains both 'network policy' and 'drop'. The rule is particularly relevant in the context of detecting potential denial-of-service attacks on network resources, aligning with the MITRE technique T1498, which pertains to impacts resulting in service disruptions. By monitoring application logs, this rule helps ensure that unauthorized or malicious modifications to network policies are flagged for review, thus maintaining the security posture of the Snowflake environment.
Categories
  • Cloud
  • Database
  • Application
Data Sources
  • Application Log
ATT&CK Techniques
  • T1498
Created: 2024-05-31