Snowflake Brute force attack on user

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect a brute force attack on a Snowflake user.

Strategy

To determine a successful attempt: Detect when the same user fails to login five times and then successfully logs in. This generates a MEDIUM severity signal.

To determine an unsuccessful attempt: Detect when the same user fails to login ten times. This generates an INFO severity signal.

Triage and response

  1. Inspect the logs to see if this was a valid login attempt.
  2. See if 2FA was authenticated.
  3. If the user was compromised, rotate user credentials.
PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data