
Summary
This detection rule, titled 'User Logged in as root', identifies instances where a user accesses a system with root privileges using SSH under the Gravitational Teleport application. Root access is a significant security concern as it provides full control over the system, allowing the user to circumvent security measures, alter configurations, and potentially execute malicious activities without detection. The rule effectively logs and monitors SSH session starts to track any occurrences where the login is performed with the root account. It flags such events as medium severity, reinforcing the best practices of using specific user accounts with granular permissions instead of relying on the root account. The underlying log event is sourced from Teleport Audit logs, which provide detailed information about session initiations, including remote addresses, usernames, timestamps, and server details, all vital for forensic analysis and incident response.
Categories
- Identity Management
- Endpoint
- Cloud
- Infrastructure
Data Sources
- User Account
- Logon Session
- Application Log
ATT&CK Techniques
- T1059
Created: 2023-11-27