
Summary
The OpenCanary REDIS Action Command Attempt rule is designed to detect attempts to execute action commands on a REDIS service that is being monitored by OpenCanary. This rule is particularly important as it helps in identifying potentially malicious activities aimed at exploiting the REDIS service, which is often targeted in credential access and collection attacks. The detection relies on the analysis of logs generated by OpenCanary, specifically looking for log entries that match a predefined log type (17001). Given the high level of threat associated with unauthorized command attempts on REDIS instances, this rule is categorized under high severity. The false positive rate is marked as unlikely, making this rule reliable for security monitoring. This rule can serve as a part of a broader security strategy to enhance the monitoring capabilities of interactive systems while also complying with best practices for anomaly detection in service environments.
Categories
- Network
- Cloud
- Containers
- Application
Data Sources
- Application Log
Created: 2024-03-08