Rules Contributing to Suspicious OCI IAM Activity: Persistence Alert

This topic covers a feature that is not available for all customers yet. See Early Access Program Features and Topics Under Development.
The following rules are used to identify suspicious OCI IAM activity usually in the persistence stage. Any one or more of these will trigger the Suspicious OCI IAM Activity: Persistence Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
OCI IAM Failure Group Deletion |
Identifies failed attempts to delete OCI IAM groups, detecting events where the DeleteGroup action fails due to errors like Forbidden, Not Found, or Conflict. This activity is significant as it may indicate unauthorized attempts to modify IAM group configurations, which could be a precursor to privilege escalation or other malicious actions. If confirmed malicious, this could allow an attacker to disrupt IAM policies, potentially leading to unauthorized access or denial of service within the OCI environment. More details
![]() Rule IDQuery{'selection1': {'eventName': 'deletegroup'}, 'selection2': {'status': [400, 401, 403, 404, 409, 412, 429]}, 'condition': 'selection1 and selection2'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity10 Suppression Logic Based On
Additional Information
|
||||||||
OCI IAM Delete Policy |
The following detection identifies when a policy is deleted on OCI. This does not identify whether successful or failed, but the error messages tell a story of suspicious attempts. More details
![]() Rule IDQuery{'selection': {'eventName': 'deletepolicy'}, 'condition': 'selection'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity20 Suppression Logic Based On
Additional Information
|
||||||||
OCI IAM Group Creation |
Identifies the creation of a group in Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM). Groups specify permissions for multiple users. Any user in a group automatically has the permissions that are assigned to the group. More details
![]() Rule IDQuery{'selection': {'eventName': 'creategroup'}, 'condition': 'selection'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity25 Suppression Logic Based On
Additional Information
|
||||||||
OCI IAM Policy Modification |
OCI IAM policies associated with a user have been modified. More details
![]() Rule IDQuery{'selection': {'eventName': ['addusertogroup', 'removeuserfromgroup']}, 'condition': 'selection'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|