heroui logo

Detect Port Security Violation

Splunk Security Content

View Source
Summary
This detection rule monitors port security violations specifically on Cisco networking devices, which can reveal attempts by unauthorized devices to access secured network ports. Utilizing logs from Cisco switches, the rule searches for specific error codes and conditions indicating a security violation. The significance of this detection lies in its ability to alert network administrators to potential security threats, enabling them to take immediate action to mitigate risks such as unauthorized access, data loss, network disruption, or lateral movements by attackers. The rule requires that network devices be configured to log forms of port security violations with at least a severity level of '5 - notification', ensuring reliable event tracing.
Categories
  • Network
  • Infrastructure
Data Sources
  • Network Traffic
ATT&CK Techniques
  • T1200
  • T1498
  • T1557
  • T1557.002
Created: 2024-11-15