Skip to content

Latest commit

 

History

History

analytics

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Analytics

List of Analytics

Analytic Description ATT&CK TTP Platform
Autoscaling Threshold Exceeded Sigma correlation rule that identifies when the number of instances in the resource group is greater than the threshold Resource Hijacking (T1496) Azure
Guest User Privilege Escalation Identifies when a guest user has privileges escalated to Global Administrator. Valid Accounts (T1078) Azure
Guest User Privilege Escalation then Storage Blob Access Modified Sigma correlation rule that identifies the sequence of events when privileges of a guest user are escalated, and the same guest user makes a storage container for public access. Valid Accounts (T1078), Modify Cloud Compute Infrastructure (T1578) Azure
Role Elevated Outside of PIM Identifies when a privileged role assignment has been made outside of the Privileged Identity Management tool. Domain Policy Modification (T1484) Azure
Service Principal Privilege Escalation Identifies when a service principal has privileges escalated to Global Administrator. Valid Accounts (T1078) Azure
Storage Blob Access Modified Identifies when a previously existing storage container has access control modified to enable public access. Modify Cloud Compute Infrastructure (T1578) Azure
Multi-Factor Authentication Failure Threshold Exceeded Identifies when a user has failed multifactor authentication within a time window more than a pre-defined threshold. Credential Access: Multi-Factor Authentication Request Generation (T1621) Azure
Autoscaling Threshold Exceeded Sigma correlation rule that identifies when autoscaling events have exceeded a pre-threshold. Resource Hijacking (T1496) Google Cloud
Permissions Granted Over Service Account Identifies when permissions granted to principal to impersonate or create keys for a service account. Domain Policy Modification: Domain Trust Modification (T1484.002) Google Cloud
SSH Key Added Identifies when an SSH key is added to an instance. Account Manipulation: Additional Cloud Credentials (T1098.001) Google Cloud
Google Storage Bucket Access Modified Identifies when a previously existing storage container has access control modified to enable public access. Modify Cloud Compute Infrastructure (T1578) Google Cloud
Google VPC Service Controls Violation for Storage Bucket Access Identifies when a Storage Bucket access attempt has been blocked by VPC Service Controls. Valid Accounts: Cloud Accounts (T1078.004), Exfiltration: Transfer Data to Cloud Account (T1537) Google Cloud
Workspace Login Marked Suspicious Identifies when a workspace login is marked suspicious. Valid Accounts: Cloud Accounts (T1078.004) Google Cloud
Workspace User Added to Privileged Group Identifies when a user is added to a privileged group. Valid Accounts: Cloud Accounts (T1078.004), Account Manipulation: Additional Cloud Roles (T1098.003) Google Cloud
User Added to Privileged Group, then Storage Bucket Modified for Public Access User Added to Privileged Group Sigma correlation rule that identifies the sequence of events when a user is added to a privileged role or group, and the same user modifies a storage bucket for public access. Valid Accounts: Cloud Accounts (T1078.004), Account Manipulation: Additional Cloud Roles (T1098.003), Modify Cloud Compute Infrastructure (T1578) Google Cloud

ATT&CK Mapping

ATT&CK Navigator heatmap of sigma rules.