heroui logo

AppOmni Alert Passthrough

Panther Rules

View Source
Summary
The AppOmni Alert Passthrough rule is designed to detect and process alerts generated by the AppOmni platform. This rule is part of a broader security framework aimed at monitoring application security issues, particularly concerning supply chain compromises and external application installations. It operates on data sourced from AppOmni alerts and audit logs, focusing primarily on security incidents flagged with varying severities. The rule utilizes multiple MITRE ATT&CK techniques that correspond to initial access, defense evasion, and exfiltration tactics, allowing it to effectively identify and respond to potential threats. With a medium severity level, the rule conducts checks on various alert types and their expected outcomes, integrating live event streams and historical data to minimize false positives and maintain accurate threat assessments. It is triggered based on a threshold of one alert within a 60-minute deduplication period, ensuring timely responses to legitimate security incidents without unnecessary noise from repeated alerts. The rule encapsulates a critical aspect of proactive cybersecurity management for organizations utilizing the AppOmni platform, facilitating a quicker response to potentially harmful actions potentially impacting application integrity and security.
Categories
  • Cloud
  • Application
  • Identity Management
Data Sources
  • Application Log
  • User Account
ATT&CK Techniques
  • T1566
  • T1528
  • T1190
  • T1078
  • T1199
  • T1548
  • T1562
  • T1090
  • T1564
  • T1556
  • T1550
  • T1110
  • T1111
  • T1552
  • T1539
  • T1486
  • T1565
  • T1485
  • T1531
  • T1204
  • T1114
  • T1098
  • T1136
  • T1484
  • T1518
  • T1087
  • T1608
  • T1530
  • T1213
  • T1537
  • T1567
  • T1195
Created: 2024-06-27