
Summary
This rule is designed to detect failed SSH login attempts for users trying to access Bitbucket repositories. It leverages audit logs to identify events categorized under 'Authentication' where the action reflects 'User login failed(SSH)'. Due to the potential for noise generated by this rule, it is advisable to correlate findings based on the 'author.name' field to distinguish between legitimate users and potential malicious actors. To ensure that audit events are captured, the 'Advance' log level must be enabled within the Bitbucket settings. Despite its effectiveness, administrators should remain cognizant of legitimate user behavior, as incorrect password entries will also trigger this rule, leading to possible false positives. This rule is particularly significant in preventing unauthorized access attempts to sensitive repositories by monitoring failed authentication attempts through SSH, which can be an indicator of malicious reconnaissance or repeated brute-force attacks.
Categories
- Web
- Identity Management
- Cloud
Data Sources
- User Account
- Service
- Application Log
Created: 2024-02-25