Rules Contributing to Suspicious OCI Modification of Route Table Alert

This topic covers a feature that is not available for all customers yet. See Early Access Program Features and Topics Under Development.
The following rules are used to identify suspicious modification of route tables in OCI. Any one or more of these will trigger the Suspicious OCI Modification of Route Table Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
OCI Route Table Created |
Identifies when an OCI Route Table has been created for the specified VCN. More details
![]() Rule IDQuery{'selection1': {'eventName': 'createroutetable'}, 'selection2': {'status': 200}, 'condition': 'selection1 and selection2'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity25 Suppression Logic Based On
Additional Information
|
||||||||
OCI Route Table Modified or Deleted |
Identifies OCI events where a route table has been modified or deleted. Route table can be used by attackers to disrupt network traffic, reroute communications, or maintain persistence in a compromised environment. More details
![]() Rule IDQuery{'selection': {'eventName': ['deleteroutetable']}, 'condition': 'selection'} Log SourceStellar Cyber OCI configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity25 Suppression Logic Based On
Additional Information
|