
Summary
The detection rule titled 'Sublime Rules Deleted Or Deactivated' is designed to monitor changes made by users, specifically focusing on actions where one or more rules in the Sublime Security platform have been disabled or deleted. This rule is classified under a medium severity level and triggers an alert when the specified change is detected. The intended use of the rule is to ascertain whether the removal or deactivation of rules was executed for legitimate business purposes or if it reflects a potential misuse of privileges or a security incident. When the alert is generated, security professionals are instructed to examine the context of these changes and determine whether re-enabling the rules is necessary to maintain the organization's security posture. The rule employs log types associated with 'Sublime.Audit' and features a threshold of one, implying that the detection of a single such event will activate the alert. Reports on this detection will align with the MITRE ATT&CK framework, specifically covering tactics related to 'TA0005' which involves privilege escalation methods and their indicators. Hence, vigilance is encouraged as this could point to potentially unauthorized actions against the security configuration.
Categories
- Cloud
- Application
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1562.001
Created: 2024-09-25