Orca Security CDR alert detected

This rule is part of a beta feature. To learn more, contact Support.
orca-security

Classification:

attack

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

Goal

Detect and respond to Cloud Detection and Response (CDR) alerts generated by Orca Security to prevent potential security breaches.

Strategy

Identify and trigger notifications for CDR alerts issued by Orca Security, indicating potential security threats.

Triage and response

  1. Assess the alert details, focusing on the category, type, and risk level.
  2. Analyze the alert context to determine the potential impact and scope of activity.
  3. Evaluate the risk associated with the alert, considering the sensitivity of the affected assets, potential compliance violations, and the likelihood of a security incident to guide decision-making and response prioritization.
  4. Follow the recommended course of action as described in the alert recommendation to contain and mitigate the threat.
  5. Implement mitigation measures to contain and remediate the activity that generated the alert, such as isolating affected systems, blocking malicious communication channels, and applying security controls to prevent further unauthorized access or data compromise.
  6. Report findings from the investigation, response actions taken, and recommendations for improving security controls to relevant stakeholders, security teams, and management to enhance visibility, communication, and incident response coordination.