
Summary
The rule titled 'Cisco Collect Data' is designed to detect potential unauthorized data collection activities from Cisco device configuration files. It focuses on specific command-line interface (CLI) commands that are often employed to extract sensitive configuration details such as 'show running-config', 'show startup-config', 'show archive config', and 'more'. These commands can be utilized by attackers to gather information about a network's configuration, which may include credentials and other sensitive data that can aid in further exploitation. The detection logic is primarily based on identifying the use of these keywords within the Cisco AAA (Authentication, Authorization, Accounting) service logs. Given that legitimate administrators commonly issue these commands for troubleshooting or system management purposes, the false positive rate for this rule is marked as low. Thus, an investigation would be warranted if the detection is triggered by an unrecognized user or in an unexpected context. This rule is particularly relevant in environments utilizing Cisco equipment and forms part of a broader strategy to monitor and secure devices against unauthorized access attempts.
Categories
- Network
- Cloud
- On-Premise
Data Sources
- Command
- Application Log
Created: 2019-08-11