Hybrid Cloud Use Cases
Use the IBM® Security QRadar® Content Extension for Hybrid Cloud Use Cases to closely monitor your hybrid cloud deployment.
About the IBM Security QRadar Content Extension for Hybrid Cloud Use Cases
The IBM Security QRadar Content Extension for Hybrid Cloud Use Cases adds several rules and saved searches that focus on detecting Virtualization activities.
- IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.3.0
- IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.1
- IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.0
- IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.1.0
- IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.0.0
- IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 1.0.0
IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.3.0
The Multi-Factor Authentication Bypass rule filter is updated to use the lower function.
The Logs Have Been Deleted / Disabled or Stopped rule is updated to be more generic to capture other cloud devices.
IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.1
The following table shows the rules and building blocks that are new or updated in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.1.
Type | Name | Description |
---|---|---|
Building Block | BB:BehaviorDefinition: Management Role Assignment Added (Office 365) | Identifies when a management role was assigned to a management role group, management role assignment policy, user, or universal security group (USG). |
Building Block | BB:BehaviorDefinition: Management Role Assignment Removed (Office 365) | Identifies when a management role was removed from a management role group, management role assignment policy, user, or universal security group (USG). |
Building Block | BB:CategoryDefinition: Object Access Events | Edit this Building Block to include all object (file, folder, etc) access related event categories. |
Building Block | BB:CategoryDefinition: Object Download Events | Edit this Building Block to include all object (file, folder, etc) download related event categories. |
Building Block | BB:CategoryDefinition: Object Upload Events | Edit this Building Block to include all object (file, folder, etc) upload related event categories. |
Building Block | BB:BehaviorDefinition: Regular Virtualization Administration | Defines regular virtual environment administration activity such as machines management, and rights management. |
Rule | Logs Have Been Deleted / Disabled or Stopped | Triggers when logs are being deleted, disabled or stopped. |
Rule | Same Management Policy Added and Deleted within a Short Period of Time (Office 365) | Triggers when there are multiple authentication failures to virtualization or cloud systems from the same source address. |
The following table shows the custom properties that are new or updated in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.1.
Name | Optimized |
---|---|
Affected Workload | Yes |
Policy Name | Yes |
The following table shows the reports that are new in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.1.
Report Name | Description |
---|---|
Office 365 File Activity - Monthly | Saved Search: Office 365: File Activity |
Office 365 File Activity - Weekly | Saved Search: Office 365: File Activity |
Office 365 Incidents that have impacted the health of an Office 365 Workload - Monthly | Saved Search: Office 365: Incidents that have impacted the health of an Office 365 Workload |
Office 365 Incidents that have impacted the health of an Office 365 Workload - Weekly | Saved Search: Office 365: Incidents that have impacted the health of an Office 365 Workload |
The following table shows the saved searches that are new in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.1.
Name | Description |
---|---|
Office365: File Activity | Describes Office 365 file activity events. |
Office 365: Incidents that have impacted the health of an Office 365 Workload | Describes incidents that have impacted the health of an Office 365 Workload |
IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.0
The following table shows the rules and building blocks that are new or updated in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.0.
Type | Name | Description |
---|---|---|
Building Block | BB: AWS Cloud: API Request Has Been Denied | Defines denied pi requests (AWS). |
Building Block | BB:BehaviourDefinition: Modification in Instance Profile (AWS) | Defines a change in the instance profile value on AWS. An instance profile contains one role, and the role can be changed at will. For example, a "Restricted Instance Profile" with a "Restricted Role" can be changed to instead have an "Admin Role". The instance profile name does not change in this case, which is more difficult to notice. |
Building Block | BB:DeviceDefinition: Cloud | More devices have been added to the building block. |
Rule | Hybrid Cloud Multiple Login Failures From Different Source IPs | Triggers when a user fails to login to a cloud platforms 25 times in two minutes from different Source IP addresses. |
Rule | Logs Have Been Deleted / Disabled or Stopped (AWS) | Triggers when there are alerts on Amazon AWS logs being deleted, disabled, or stopped . |
Rule | Multiple Failed API Requests From Same Source IP (AWS) | Triggers when at least 10 failed API requests have been initiated from the same Source IP in two minutes. |
Rule | Multiple Failed API Requests From The Same Username (AWS) | Triggers when at least 10 failed API requests have been initiated from the same username in two minutes. |
Rule | Potential Change To AWS Trail Logging Configurations | Triggers when there are alerts on configuration changes to the Cloud Trail logs. |
Rule | Potential Privilege Escalation via Instance Profile (AWS) | Triggers when an admin action is performed after an AWS instance profile has changed. A user may change an AWS instance profile to assign a different role. If an admin activity follows this action, it can indicate a potential privilege escalation event. |
Rule | Security Rule Created or Deleted (Azure) | Triggers when a security rule is created or deleted by a low privileged user. This can indicate an attacker creating or deleting a security rule to either grant access or deny access to a virtual machine or resource. |
The following table shows the custom properties that are new or updated in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.0.
Name | Optimized | Description |
---|---|---|
Federated User | No | This property is a placeholder for default custom extraction of Federated User from DSM payloads. |
Group Name | Yes | This property is a placeholder for default custom extraction of Group Name from DSM payloads. |
Local Network Gateway | No | This property is a placeholder for default custom extraction of Local Network Gateway from DSM payloads. |
Network Interface | No | This property is a placeholder for default custom extraction of Network Interface from DSM payloads. |
Network Security Group | No | This property is a placeholder for default custom extraction of Network Security Group from DSM payloads. |
Network Watcher | No | This property is a placeholder for default custom extraction of Network Watcher from DSM payloads. |
Profile | Yes | This property is a placeholder for default custom extraction of Profile from DSM payloads. |
Security Rule | No | This property is a placeholder for default custom extraction of Security Rule from DSM payloads. |
UserType | Yes | This property is a placeholder for default custom extraction of UserType from DSM payloads. |
Virtual Network | No | This property is a placeholder for default custom extraction of Virtual Network from DSM payloads. |
VPC ID | Yes | This property is a placeholder for default custom extraction of VPC ID from DSM payloads. |
The following table shows the reference sets that are new in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.0.
Type | Name |
---|---|
Reference Set | AWS - Audit Events |
Reference Set | AWS - VPC Events |
The following table shows the reports that are new in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.0.
Report Name | Description |
---|---|
AWS Audit Events - Monthly | Provides greater monitoring and trending of AWS audit activities. |
AWS Audit Events - Weekly | Provides greater monitoring and trending of AWS audit activities. |
AWS Failed Console Logins Federated Users - Monthly | Provides greater monitoring and trending of AWS login activities. |
AWS Failed Console Logins Federated Users - Weekly | Provides greater monitoring and trending of AWS login activities. |
AWS Failed Console Logins Non-Federated Users - Monthly | Provides greater monitoring and trending of AWS login activities. |
AWS Failed Console Logins Non-Federated Users - Weekly | Provides greater monitoring and trending of AWS login activities. |
AWS Policy Changes Audit - Monthly | Provides greater monitoring and trending of AWS policy change activities. |
AWS Policy Changes Audit - Weekly | Provides greater monitoring and trending of AWS policy change activities. |
AWS Security Group Ingress - Monthly | Provides greater monitoring and trending of AWS security group ingress activities. |
AWS Security Group Ingress - Weekly | Provides greater monitoring and trending of AWS security group ingress activities. |
AWS Successful Console Logins Federated Users - Monthly | Provides greater monitoring and trending of AWS login activities. |
AWS Successful Console Logins Federated Users - Weekly | Provides greater monitoring and trending of AWS login activities. |
AWS Successful Console Logins Non-Federated Users - Monthly | Provides greater monitoring and trending of AWS login activities. |
AWS Successful Console Logins Non-Federated Users - Weekly | Provides greater monitoring and trending of AWS login activities. |
AWS VPC Event Audit - Monthly | Provides trending for events from the Amazon Virtual Private Cloud. |
AWS VPC Event Audit - Weekly | Provides trending for events from the Amazon Virtual Private Cloud. |
Azure Network Security Group Created or Updated - Monthly | Provides greater monitoring and trending for Azure security groups. |
Azure Network Security Group Created or Updated - Weekly | Provides greater monitoring and trending for Azure security groups. |
Azure Security Rule Created, Updated or Deleted - Monthly | Provides greater monitoring and trending for Azure security rules. |
Azure Security Rule Created, Updated or Deleted - Weekly | Provides greater monitoring and trending for Azure security rules. |
Azure Virtual Network Created or Updated - Monthly | Provides greater monitoring and trending for Azure virtual networks. |
Azure Virtual Network Created or Updated - Weekly | Provides greater monitoring and trending for Azure virtual networks. |
Azure Web Apps Virtual Connections Deleted - Monthly | Provides greater monitoring and trending for Azure web app virtual connections. |
Azure Web Apps Virtual Connections Deleted - Weekly | Provides greater monitoring and trending for Azure web app virtual connections. |
Virtualization - Group Auditing - Monthly | Provides greater monitoring and trending of Cloud group auditing activities. |
Virtualization - Group Auditing - Weekly | Provides greater monitoring and trending of Cloud group auditing activities. |
Virtualization - Role Creations, Deletions and Updates - Monthly | Provides greater monitoring and trending of Cloud role activities. |
Virtualization - Role Creations, Deletions and Updates - Weekly | Provides greater monitoring and trending of Cloud role activities. |
Virtualization - User Account Created - Monthly | Provides greater monitoring and trending of Cloud user account creation activities. |
Virtualization - User Account Created - Weekly | Provides greater monitoring and trending of Cloud user account creation activities. |
The following table shows the saved searches that are new in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.2.0.
Name | Description |
---|---|
AWS Audit Events | This saved search is used in the Audit Event reports. |
AWS Failed Console Logins Fed User - Group by Username and Source IP | This saved search is used in the Failed Console Logins Federated User reports. |
AWS Failed Console Logins Non-Fed User - Grouped by Username and Source IP | This saved search is used in the Failed Console Logins Non-Federated User reports. |
AWS Policy Change Audit | This saved search is used in the Policy Change reports. |
AWS Security Group Ingress | This saved search is used in the Security Group Ingress reports. |
AWS Success Console Logins Fed User - Group by Username and Source IP | This saved search is used in the Successful Console Logins Federated User reports. |
AWS Success Console Logins Non-Fed User - Group by Username and Source IP | This saved search is used in the Successful Console Logins Non-Federated User reports. |
AWS VPC Audit Event | This saved search is used in the VPC Event Audit reports. |
Azure Network Security Group Created or Updated | This saved search is used in the Security Group Created or Updated reports. |
Azure Security Rule Created, Updated or Deleted | This saved search is used in the Security Rule Created, Updated or Deleted reports. |
Azure Virtual Network Created or Updated | This saved search is used in the Virtual Network Created or Updated reports. |
Azure Web Apps Virtual Network Connections Deleted | This saved search is used in the Web Apps Virtual Network Connections Deleted reports. |
Virtualization - Group Changes Audit | This saved search is used in the Group Changes reports. |
Virtualization - Role Creations, Deletions and Updates | This saved search is used in the Role reports. |
Virtualization - User Account Created | This saved search is used in the User Account Created reports. |
IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.1.0
The following table shows the rules and building blocks that are new or updated in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.1.0.
Type | Name | Description |
---|---|---|
Building Block | BB:DeviceDefinition: Cloud | Defines all cloud sources on the system. |
Rule | Hybrid Cloud Multiple Login Failures from Same Source | Triggers when there are multiple authentication failures to virtualization or cloud systems from the same source address. |
Rule | Hybrid Cloud Multiple Login Failures from Same Username | Triggers when there are multiple authentication failures to virtualization or cloud systems from the same username. |
IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.0.0
This content extension was renamed from IBM Security QRadar Virtualized Environment Content Extension to IBM Security QRadar Content Extension for Hybrid Cloud Use Cases.
The following table shows the custom event properties in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases V2.0.0.
Custom Property | Found in |
---|---|
Access Key ID | Amazon AWS |
Alert Severity | |
Audit Flags | |
MFA Used | |
Object ID | Azure |
ObjectName | Microsoft Office 365 |
ObjectType | |
Search Executed | Microsoft Office 365 |
Target Access Key ID | Amazon AWS |
Target User ID | Azure |
User ID | Azure |
UserType | Amazon AWS |
Volume ID | Amazon AWS |
The following table shows the rules and building blocks that are new or updated in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.0.0.
Type | Name | Description |
---|---|---|
Building Block | BB:BehaviorDefinition: Access Key Creation for Another User (AWS) | Defines a user creating an access key for another user. In AWS, a user with
iam:CreateAccessKeypermission can create access keys for a user they have access to. An attacker can potentially gain access to an admin user. AWS access keys are credentials used for requests to AWS CLI or API. |
Building Block | BB:BehaviorDefinition: Credential Exfiltration in Amazon GuardDuty | Defines when credential exfiltration in Amazon GuardDuty is detected. |
Building Block | BB:BehaviorDefinition: Default Policy Creation (AWS) | Defines when a user created a new policy version and set it to default(current) version. In
AWS, a user with the iam:CreatePolicyVersionpermission can overwrite an existing policy, by creating a new version on top. An attacker can assign themselves the highest privileges, or revoke security managers permissions which are privilege escalation and defense evasion techniques. |
Building Block | BB:BehaviorDefinition: Default Policy Version Modification (AWS) | Defines when the default policy version is changed for a user. In AWS, a user with the
iam:SetDefaultPolicyVersionpermission can change the policy to a different version, which is called default(current) policy version. This requires the policy version to be prepopulated, as the user has no permission to rewrite the policy. For example, a policy called |
Building Block | BB:BehaviorDefinition: Medium or High Severity Virtualization Events | Defines medium and high severity events in a virtualization environment. The following
indicators have been used as a base to define each level of severity.
Tune the thresholds accordingly to your needs. In Azure, the event severity is based on the Azure Security Center and Azure Defender. The alerts shown in your environment depend on the resources and services as well as your custom configuration. In AWS GuardDuty, the following definitions define the severity:
|
Building Block | BB:BehaviorDefinition: Regular Virtualization Administration | Defines regular virtual environment administration activity, such as machine management, and rights management. |
Building Block | BB:BehaviorDefinition: Role Assigned to a Resource with Managed Identity (Azure) | Defines when an Azure resource instance with managed identity is assigned a role to another resource. Resources with managed identity can access and managed other resources through Azure Active Directory Authentication. |
Building Block | BB:BehaviorDefinition: Suspicious Virtualization Activities | Defines suspicious virtualization activities. |
Building Block | BB:BehaviorDefinition: Volume Detached and Attached on the Same Machine | Detects a volume being detached from a machine, and reattached to that machine within one hour. |
Building Block | BB:CategoryDefinition: Cloud Object Shared (O365) | Defines the Policy Sharing category in Office 365, such as policy regarding calendar, contacts, and email. |
Building Block | BB:CategoryDefinition: Network Configuration Update on Virtual Machines | This building block was removed from the content extension. |
Building Block | BB:CategoryDefinition: Virtual Machine Configuration Change | The rule filter of this building block was updated. |
Rule | Credential Exfiltration and Administration Task from the Same User | Triggers when a credential exfiltration alert occurs in a short time span before or after an administration task has been observed, which could indicate the attacker made use of their access to the platform. |
Rule | High Privilege Virtual Machine Performing Suspicious Actions | Triggers when a virtual machine that can access storage that contains personal information such as credit card numbers performs suspicious activities. This action can indicate a virtual machine changing the permissions to perform malicious actions. |
Rule | Multi-Factor Authentication Bypass | Triggers on login attempts to virtualization or cloud systems without multi-factor
authentication (MFA). Note: This rule is disabled by default because MFA may not be enabled or used
in some business scenarios. Only those environments where MFA is used should enable this
rule.
|
Rule | Suspicious Activity Followed by Virtualization Administration Task | Triggers when suspicious activities are discovered followed by regular administration tasks in a virtualized environment. Suspicious activities include multiple virtual machines being deleted, and credential exfiltration detected. Regular administrative tasks include creation or deletion of a virtual machine, and roles updates. |
Rule | Suspicious Number of Modifications Made on Virtual Machines | Renamed from Abnormal Number of Modifications Made on Virtual Machines. |
Rule | Suspicious Number of Virtual Machines Created | Renamed from Abnormal Number of Virtual Machines Created. |
Rule | User Assumed a Privileged Access (AWS) | Triggers when a user with temporary privileged access is detected. On AWS, assume role
returns temporary credentials to resources the user has requested access for. The user's temporary
security credentials or access key will be added to the Temporary Access Keys
reference set, which by default has a time-to-live interval of 1 hour. Adjust the time depending on
the environment's expiry configuration. Note: The Low Privilege Role Names
reference set must be populated with the relevant role names. Anything not defined in this reference
set is considered as suspicious in terms of privileges.
|
Rule | User Changed to High Privilege Role | Renamed from User Role Changed to High Privilege Role Names. |
Rule | User Changed to Low Privilege Role | Renamed from User Role Changed to Low Privilege Role Names. |
Rule | User with Temporary Access Performing Suspicious Activities (AWS) | Triggers when a user with temporary access performs suspicious activities. On AWS, assume role returns temporary credentials to resources the user has requested access for. This alone does not indicate an attack as the credentials may not even be used or the user may be legitimate but further activities should be monitored. |
Rule | Virtual Machine High Privilege Role Assigned | Adds the Machine ID of a virtual machine to the Resources with High Privilege
Roles reference set, if it was assigned a high privilege role. Note: The Low
Privilege Role Names reference set must be populated with the relevant role names.
Anything not defined in this reference set is considered as suspicious in terms of
privileges.
|
Rule | Virtual Machine High Privilege Role Unassigned | Removes the Machine ID of a virtual machine to the Resources with High Privilege
Roles reference set, if it was unassigned a high privilege role. Note: The
Low Privilege Role Names reference set must be populated with the relevant
role names. Anything not defined in this reference set is considered as suspicious in terms of
privileges.
|
Rule | Volume Attached and Detached on Different Machines | Triggers when a single volume is being attached and detached on multiple machines. For example, replacing an SSH key pair in an AWS environment involves switching volumes on different instances. Such manipulation of volumes could reveal a malicious behavior. |
The following table shows the reports that are new or updated in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.0.0.
Report Name | Search Name and Descriptions |
---|---|
Virtualization - Machine Creation | Saved Searches: Virtualization - Machine Creation, Virtualization - Machine Creation per
Username Report of the virtual machines created over the last 24 hours. |
Virtualization - User Creation by Country | Saved Search: Cloud User Creation by Country Show user creations by country. The report content is collated by using the Cloud User Creation by Country search. Edit this search and any relevant search dependencies to refine the results. |
The following table shows the reference data that is new or updated in IBM Security QRadar Virtualization Content Extension 2.0.0.
Type | Name | Description |
---|---|---|
Reference Set | Resources with High Privilege Roles | Defines resources with high privilege roles. |
Reference Set | Temporary Access Keys | Defines AWS temporary access keys. |
The following table shows the saved searches that are new or updated in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 2.0.0.
Name | Description |
---|---|
Microsoft Office365 eDiscovery Search Created or Started | Defines Azure eDiscovery events for search created or started. |
Microsoft Office365 eDiscovery Search Deleted | Defines Azure eDiscovery events for search deleted. |
Microsoft Office365 eDiscovery Search Exported or Downloaded | Defines Azure eDiscovery events for search exported or downloaded. |
Virtualization - Machine Creation | Defines virtual machine creation events. |
Virtualization - Machine Creation per Username | Defines virtual machine creation events grouped by username. |
Virtualization - User Creation by Country | Defines user creation events by country for cloud devices. |
Virtualization - User Locked Accounts | Defines locked user accounts for cloud devices. |
IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 1.0.0
The following table shows the custom event properties in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 1.0.0.
Custom Property | Optimized | Found in |
---|---|---|
Machine ID | Yes |
|
Role Name | Yes |
|
Target User Name | Yes |
|
The following table shows the building blocks and rules in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 1.0.0.
Type | Name | Description |
---|---|---|
Building Block | BB:CategoryDefinition: User Role Assign Events | Edit this Building Block to include any user role assignment events. |
Building Block | BB:DeviceDefinition: Virtualization | This rule defines all Hypervisors on the system. |
Building Block | BB:DeviceDefinition: Cloud | This rule defines all Cloud sources on the system. |
Building Block | BB:CategoryDefinition: Virtual Machine Restarted | Edit this Building Block to include all events that indicate virtual machine restarted. |
Building Block | BB:CategoryDefinition: Virtual Machine Started | Edit this Building Block to include all events that indicate virtual machine started. |
Building Block | BB:CategoryDefinition: Virtual Machine Stopped | Edit this Building Block to include all events that indicate virtual machine stopped. |
Building Block | BB:CategoryDefinition: Virtual Machine Deleted | Edit this Building Block to include all events that indicate virtual machine deleted. |
Building Block | BB:CategoryDefinition: Configuration Change Events on Virtual Machines | Edit this Building Block to include any configure events. |
Building Block | BB:CategoryDefinition: Network Configuration Update on Virtual Machines | Edit this Building Block to include all events that indicate network configuration update on virtual machines. |
Building Block | BB:CategoryDefinition: System Configuration | This Building Block defines system configuration events. |
Building Block | BB:CategoryDefinition: Virtual Machine Created | Edit this Building Block to include all events that indicate virtual machine created. |
Rule | User Role Changed to Low Privilege Role Names | This rule removes a username from the reference set Users with High Privilege Role Names if
the user is given lower privilege role. Note: The Low Privilege Role Names reference set must be
populated with the relevant role names. Anything not defined in this Reference Set is considered as
suspicious in terms of privileges.
|
Rule | Sensitive Virtual Machines Unavailable for a Long Period of Time |
This rule triggers when a sensitive virtual machine has been stopped and unavailable for a long period of time. Tune the rule by changing the down time for a sensitive virtual machine. |
Rule | User Role Changed to High Privilege Role Names | This rule adds a username to the reference set User with High Privilege Role Names if the
user achieved potential high privilege role. Note: The Low Privilege Role Names reference set must be
populated with the relevant role names. Anything not defined in this Reference Set is considered as
suspicious in terms of privileges.
|
Rule | High Privilege User Performing Suspicious Actions | This rule triggers when a user role changes on a higher privilege (e.g. Administrator), followed by suspicious activities. This action can indicate a user changing the permissions to perform malicious actions or accessing unauthorized machines. |
Rule | Multiple Sensitive Virtual Machines Deleted within Short Period of Time | This rule triggers when multiple sensitive machines or security devices are being deleted
succinctly. This may indicate an intruder is compromising sensitive information or getting hidden
before an attack. Note: The Sensitive Virtual Machines reference set must be populated with the
relevant machines name.
Note:
If authorized users perform this action often, exclude them by adding in a rule condition. See Abnormal Number of Modifications Made on Virtual Machines for an example. |
Rule | Multiple Virtual Security Devices Powered Off within Short Period of Time | This rule triggers when multiple virtual security devices (e.g virtual IDS, virtual SIEM
component) are powered off in a short period of time. Note: The Security Devices reference set must
be populated with the relevant machine names or IDs.
Note:
If authorized users perform this action often, exclude them by adding in a rule condition. See Abnormal Number of Modifications Made on Virtual Machines for an example. |
Rule | Abnormal Number of Modifications Made on Virtual Machines | This rule triggers when an abnormal number of configuration updates are performed on virtual
machines. A typical administration should not imply multiple configuration updates, such as adding
more memory or reducing the storage size for one or multiple machines. This indicates suspicious
behaviour Note: Populate the Authorized Users reference set with users who are authorized to
perform these actions.
|
Rule | Abnormal Number of Virtual Machines Created | This rule triggers when a high number of virtual machines is created in a short period of time. This can show a malicious user behaviour. See Abnormal Number of Modifications Made on Virtual Machines for an example. |
The following table shows the reference data in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 1.0.0.
Type | Name | Description |
---|---|---|
Reference Set | Authorized Users | Defines authorized users. This reference set can be used to exclude authorized users from triggering false positives when performing high privileged actions. |
Reference Set | Low Privilege Role Names | Collects usernames with high privilege role names. |
Reference Set | Security Devices | Defines security device names or IDs. |
Reference Set | Sensitive Virtual Machines | Defines sensitive virtual machine names or IDs. |
Reference Set | Users with High Privilege Role Names | Collects usernames with high privilege role names. |
The following table shows the saved searches in IBM Security QRadar Content Extension for Hybrid Cloud Use Cases 1.0.0.
Name | Description |
---|---|
VMWare Audit Events | Defines VMware audit events. |
VMWare System Status | Defines VMware system status events. |