Delinea Privilege Manager detected a password disclosure event

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects password disclosure events.

Strategy

This rule monitors the Delinea Privilege Manager logs to detect password disclosure events.

Triage and Response

  1. Investigate the password disclosure event log associated with the managed user: {{@ManagedUserName}}.
  2. Assess whether the managed user account (username: {{@ManagedUserName}}, ID:{{@_ManagedUserId}}) is associated with a critical system or application.
  3. Identify the user to confirm the identity and permissions of the user who disclosed the password.
  4. If the password is disclosed for a critical system, contact the disclosing user to confirm whether the password disclosure was intentional and authorized.
  5. If the disclosure was unauthorized, proceed with account remediation.
  6. Reset the password for the managed user account (username: {{@ManagedUserName}}, ID:{{@_ManagedUserId}}) to prevent potential misuse.
  7. Evaluate and improve access policies to prevent future occurrences.
PREVIEWING: brett.blue/embedded-collector-nav