Tailscale API access token created

This rule is part of a beta feature. To learn more, contact Support.

Set up the tailscale integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

Goal

Detect when a Tailscale API access token has been created.

Strategy

This rule monitors Tailscale logs for when an API access token has been created. An attacker may create an API access token to maintain unauthorized access to the environment. This rule detects the creation of:

Triage and response

  1. Investigate the user {{@usr.email}} that created the API Key {{@target.id}}.
  2. Investigate the {{@new.capabilities}} details to determine the scope of permissions that the created API Key has and if it should have those permissions.
  3. If the activity is deemed malicious:
    • Begin your organization’s incident response process and investigate.