Tailscale API access token created

This rule is part of a beta feature. To learn more, contact Support.

Set up the tailscale integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when a Tailscale API access token has been created.

Strategy

This rule monitors Tailscale logs for when an API access token has been created. An attacker may create an API access token to maintain unauthorized access to the environment. This rule detects the creation of:

Triage and response

  1. Investigate the user {{@usr.email}} that created the API Key {{@target.id}}.
  2. Investigate the {{@new.capabilities}} details to determine the scope of permissions that the created API Key has and if it should have those permissions.
  3. If the activity is deemed malicious:
    • Begin your organization’s incident response process and investigate.