Rules Contributing to Suspicious OCI Instance Activity Alert

This topic covers a feature that is not available for all customers yet. See Early Access Program Features and Topics Under Development.
The following rules are used to identify suspicious instance activity in OCI. Any one or more of these will trigger the Suspicious OCI Instance Activity Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
OCI Multiple Instances Terminated |
Detects when multiple instances were terminated. More details
![]() Rule IDQuery{'selection': {'eventName': 'TerminateInstance'}, 'condition': 'selection | count() by srcip >= 5', 'timeframe': '10m'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity75 Suppression Logic Based On
Additional Information
|
||||||||
OCI Multiple Instances Launched |
Detects when multiple instances were launched. More details
![]() Rule IDQuery{'selection': {'eventName': 'LaunchInstance'}, 'condition': 'selection | count() by srcip >= 5', 'timeframe': '10m'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|