Malicious IP connected to MySQL database

Set up the mysql integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect database connections from IP addresses that are identified as malicious. Network access to database servers should be restricted.

Strategy

This rule monitors logs from MySQL to detect when a connection originates from an IP identified as malicious. Datadog enriches all ingested logs with threat intelligence in real time.

Triage and response

  1. Determine if the user {{ @db.user }} is expected to authenticate from the IP {{ @network.client.ip }}.
  2. Restrict network access to the database. Remove any public access.
  3. If the login was successful review database logs for suspicious actions taken by the user {{ @db.user }}.
  4. Rotate credentials for the affected account.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc