Rules Contributing to Suspicious OCI IAM Activity: Impact Alert

This topic covers a feature that is not available for all customers yet. See Early Access Program Features and Topics Under Development.
The following rules are used to identify suspicious OCI IAM activity usually in the impact stage. Any one or more of these will trigger the Suspicious OCI IAM Activity: Impact Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
OCI IAM Successful Group Deletion |
Identifies the deletion of a specified Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) group, which is a collection of users who share a similar set of access privileges. The group must be empty. More details
![]() Rule IDQuery{'selection1': {'eventName': 'deletegroup'}, 'selection2': {'status': [200, 204]}, 'condition': 'selection1 and selection2'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity25 Suppression Logic Based On
Additional Information
|
||||||||
OCI IAM Deactivation of MFA Device |
Identifies the deactivation of a specified multi-factor authentication (MFA) time-based one-time password (TOTP) device and removes it from association with the user for which it was originally enabled. More details
![]() Rule IDQuery{'selection': {'eventName': 'deletemfatotpdevice'}, 'condition': 'selection'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresTA0040, T1531, TA0003, T1556.006 References
N/A
Severity50 Suppression Logic Based On
Additional Information
|