Unusual password reset rate activity
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect excessive password reset requests activity.
This may be caused by a malicious actor trying to use the feature to list existing users, or compromise some.
Required business logic events
Datadog auto-instruments many event types. Review your instrumented business logic events. This detection requires the following instrumented event:
Strategy
Count the number password reset requests and detect deviations from historical patterns.
Require the password reset to be flagged using either a user event or a custom WAF rule.
A Low
signal is then generated if more the password reset requests for a single service over 5 minutes deviates too far from the baseline.
Triage and response
- Investigate the IP activity over the flagged time window and validate that it is legitimate.
- Review your password reset process to ensure it’s not leaking whether the user existed or not.
- Consider blocking the IPs to slow down the attacker.