Information Leakage Detection Playbook
Introduction: The Need for Effective Information Leakage Detection Capabilities
Table of Contents
1. Initial Detection of Information Leakage
Query Option 1: Identify Access to Sensitive Files
Query Option 2: Detect Unusual Data Transfers
Query Option 3: Analyse Email Activity for Leakage Patterns
2. Compromised Account Indicators
Query Option 1: Failed Login Attempts to Sensitive Systems
Query Option 2: Logins from Unusual Locations
Query Option 3: Suspicious Account Privilege Escalation
3. Data Exfiltration Indicators
Query Option 1: Detect Large Data Transfers
Query Option 2: Monitor Uploads to Cloud Storage
Query Option 3: Identify Anomalous Email Attachments
4. Threat Persistence Indicators
Query Option 1: Monitor Unauthorised Access Persistence
Query Option 2: Detect Persistent Email Rules
Query Option 3: Track Credential Misuse
5. Incident Response and Containment
Query Option 1: Isolate Affected Accounts and Devices
Query Option 2: Correlate Indicators of Compromise (IoCs)
Query Option 3: Incident Timeline Reconstruction
6. Conclusion
Last updated