Tailscale API access token created

This rule is part of a beta feature. To learn more, contact Support.
tailscale

Classification:

attack

Set up the tailscale integration.

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when a Tailscale API access token has been created.

Strategy

This rule monitors Tailscale logs for when an API access token has been created. An attacker may create an API access token to maintain unauthorized access to the environment. This rule detects the creation of:

Triage and response

  1. Investigate the user {{@usr.email}} that created the API Key {{@target.id}}.
  2. Investigate the {{@new.capabilities}} details to determine the scope of permissions that the created API Key has and if it should have those permissions.
  3. If the activity is deemed malicious:
    • Begin your organization’s incident response process and investigate.
PREVIEWING: may/unit-testing