Detections
- Home
- - Detections
- -DT118
- ID: DT118
- Created: 29th April 2025
- Updated: 29th April 2025
- Platform: Oracle Cloud Infrastructure (OCI)
- Contributor: The ITM Team
OCI Unauthorized System or Service Modification
Monitor Oracle Cloud Infrastructure (OCI) Audit Logs to detect unauthorized system or service creation. Unauthorized provisioning in OCI can indicate insider threat activity aimed at illicit compute use, data staging, or security control bypass.
Where to Configure/Access
- OCI Audit Console: https://cloud.oracle.com/audit
- OCI Audit Documentation: https://docs.oracle.com/en-us/iaas/Content/Audit/Concepts/auditoverview.htm
Detection Methods
Analyze Audit Events such as:
LaunchInstance
(Compute instance creation)CreateBucket
(Object Storage creation)CreateVolume
(Block Volume creation)CreateVcn
(Virtual Network creation)
Configure Object Storage log exports and integrate with SIEM tools (e.g., Splunk, QRadar) for real-time detection.
Indicators
- Compute or storage resources created in unauthorized compartments.
- VCNs created without associated security lists or network ACLs.
- Instances launched using high-compute shapes without approved business justification.
Sections
ID | Name | Description |
---|---|---|
IF009.006 | Installing Crypto Mining Software | The subject installs and operates unauthorized cryptocurrency mining software on organizational systems, leveraging compute, network, and energy resources for personal financial gain. This activity subverts authorized system use policies, degrades operational performance, increases attack surface, and introduces external control risks.
Characteristics
Example ScenarioA subject installs a customized |