heroui logo

Snyk Service Account Change

Panther Rules

View Source
Summary
The Snyk Service Account Change rule is designed to monitor and detect changes to Service Accounts within the Snyk environment. Detection occurs through specific events logged in the Snyk audit logs that indicate the creation, deletion, or modification of Service Accounts, which are system user accounts with associated API tokens instead of standard user credentials. This rule classifies events based on the severity of the action: critical severity is assigned to deletion actions of Service Accounts with an ADMIN role; creation events are categorized with a high severity, and edits to Service Accounts hold medium severity. Events are captured and logged when Service Accounts with ADMIN roles are involved, and specific permissions and actions taken affect the severity assigned. The rule runs with a deduplication period of 60 minutes and has a threshold of 1, allowing immediate detection upon the occurrence of a designated event. Overall, the detection mechanism relies on understanding user actions within the Snyk platform and taking appropriate steps when these actions impact security.
Categories
  • Cloud
  • Application
  • Identity Management
Data Sources
  • Snapshot
  • Application Log
  • Logon Session
Created: 2023-04-18