
Summary
The Linux Auditd Add User Account Type detection rule is designed to identify potentially suspicious behavior where a new user account is added on a Linux system. This behavior is crucial for monitoring by a Security Operations Center (SOC) as it may signify attempts of unauthorized access or efforts to maintain control over a system. Such actions could represent malicious activity and pose serious risks, including compromised systems or unauthorized access to sensitive data. The rule implements detection by analyzing the Linux Auditd logs for user account creation events, which are logged when the system issues an ADD_USER action. The implementation relies on the ingestion of auditd logs through Splunk, where specific fields in these logs are normalized to ensure consistency and facilitate efficient monitoring and response. Configuration includes filtering to minimize false positives, particularly from legitimate administrative actions. The rule is intended for deployment in environments where compliance and security are paramount, ensuring early detection of potential security incidents.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- User Account
ATT&CK Techniques
- T1136
- T1136.001
Created: 2024-11-13