
Summary
The 'Bitbucket User Login Failure' detection rule is designed to identify events related to failed user authentication attempts within Bitbucket's audit logs. These attempts are particularly relevant for detecting potential unauthorized access attempts and credential attacks. The rule specifically looks for entries where the 'auditType.category' is marked as 'Authentication' and the 'auditType.action' is 'User login failed'. Given that authentication failures can be common among legitimate users (often due to incorrect password entries), the rule may generate noise and hence should ideally be paired with correlation logic, particularly focusing on the 'author.name' field to filter out legitimate activities. The rule operates under the Bitbucket product and requires an 'Advance' log level to effectively catch the pertinent audit events. It is important to keep in mind the potential for false positives when interpreting the results of this detection.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2024-02-25