This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect a brute force attack on a Snowflake user.

Strategy

To determine a successful attempt: Detect when the same user fails to login five times and then successfully logs in. This generates a MEDIUM severity signal.

To determine an unsuccessful attempt: Detect when the same user fails to login ten times. This generates an INFO severity signal.

Triage and response

  1. Inspect the logs to see if this was a valid login attempt.
  2. See if 2FA was authenticated.
  3. If the user was compromised, rotate user credentials.
PREVIEWING: may/unit-testing