SigmaHQ/rules/network/cisco/aaa/cisco_cli_local_accounts.yml
2020-09-15 07:02:30 -06:00

26 lines
651 B
YAML

title: Cisco Local Accounts
id: 6d844f0f-1c18-41af-8f19-33e7654edfc3
status: experimental
description: Find local accounts being created or modified as well as remote authentication configurations
author: Austin Clark
date: 2019/08/12
modified: 2020/09/02
logsource:
product: cisco
service: aaa
category: accounting
fields:
- CmdSet
detection:
keywords:
- 'username'
- 'aaa'
condition: keywords
falsepositives:
- When remote authentication is in place, this should not change often
level: high
tags:
- attack.persistence
- attack.t1136 # an old one
- attack.t1136.001
- attack.t1098