CyberArk Privileged Access Security Error
Identifies the occurrence of a CyberArk Privileged Access Security (PAS) error level audit event. The event.code correlates to the CyberArk Vault Audit Action Code.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/06/23"
3integration = ["cyberarkpas"]
4maturity = "production"
5promotion = true
6updated_date = "2024/05/21"
7
8[rule]
9author = ["Elastic"]
10description = """
11Identifies the occurrence of a CyberArk Privileged Access Security (PAS) error level audit event. The event.code
12correlates to the CyberArk Vault Audit Action Code.
13"""
14false_positives = ["To tune this rule, add exceptions to exclude any event.code which should not trigger this rule."]
15from = "now-30m"
16index = ["filebeat-*", "logs-cyberarkpas.audit*"]
17language = "kuery"
18license = "Elastic License v2"
19name = "CyberArk Privileged Access Security Error"
20note = """## Setup
21
22The CyberArk Privileged Access Security (PAS) Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
23
24## Triage and analysis
25
26This is a promotion rule for CyberArk error events, which are alertable events per the vendor.
27Consult vendor documentation on interpreting specific events.
28"""
29references = [
30 "https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASREF/Vault%20Audit%20Action%20Codes.htm?tocpath=Administration%7CReferences%7C_____3",
31]
32risk_score = 73
33rule_id = "3f0e5410-a4bf-4e8c-bcfc-79d67a285c54"
34rule_name_override = "event.action"
35severity = "high"
36tags = [
37 "Data Source: CyberArk PAS",
38 "Use Case: Log Auditing",
39 "Use Case: Threat Detection",
40 "Tactic: Privilege Escalation",
41]
42timestamp_override = "event.ingested"
43type = "query"
44
45query = '''
46event.dataset:cyberarkpas.audit and event.type:error
47'''
48
49
50[[rule.threat]]
51framework = "MITRE ATT&CK"
52[[rule.threat.technique]]
53id = "T1078"
54name = "Valid Accounts"
55reference = "https://attack.mitre.org/techniques/T1078/"
56
57
58[rule.threat.tactic]
59id = "TA0004"
60name = "Privilege Escalation"
61reference = "https://attack.mitre.org/tactics/TA0004/"
62[[rule.threat]]
63framework = "MITRE ATT&CK"
64
65[rule.threat.tactic]
66id = "TA0001"
67name = "Initial Access"
68reference = "https://attack.mitre.org/tactics/TA0001/"
Setup
The CyberArk Privileged Access Security (PAS) Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
Triage and analysis
This is a promotion rule for CyberArk error events, which are alertable events per the vendor. Consult vendor documentation on interpreting specific events.
References
Related rules
- CyberArk Privileged Access Security Recommended Monitor
- Credential Manipulation - Detected - Elastic Endgame
- Credential Manipulation - Prevented - Elastic Endgame
- Execution with Explicit Credentials via Scripting
- Expired or Revoked Driver Loaded