Breez

Prev Next
Self Service Ingestion

Connect this data source on your own, using the Hunters platform.

TL;DR

Supported data types

3rd party detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Breez Security Logs

✅

✅

✅

breez_security_logs

NDJSON

S3-LIST


Overview

breezThis article explains how to connect your Breez Security Logs.

Breez is an advanced security telemetry platform designed to simplify the collection and normalization of data from diverse sources, including endpoints, identity systems, cloud infrastructure, and business applications. It delivers a structured and enriched view of security activity, enabling teams to detect anomalies, investigate incidents, and respond more quickly and precisely.

The Breez Security Logs serve as a dependable foundation for in-depth analysis and proactive threat hunting. By prioritizing context, clarity, and interoperability, Breez empowers modern security operations teams to transform raw telemetry into actionable intelligence.

Identity Threat Detection and Response - Breez Security

Supported data types

Breez Security Logs

Overview

Table name: breez_security_logs

Breez Security is an Identity Threat Detection and Response (ITDR) platform focused on real-time identity protection across cloud and SaaS environments. It monitors both human and non-human identities—such as service accounts, bots, API keys, and automation—across providers like AWS, Azure, GCP, Office 365, and Google Workspace.

By building dynamic behavioral fingerprints for each identity, Breez detects anomalies including credential compromise, insider threats, and automation misuse before they escalate. Its agentless telemetry, AI-powered analytics, and identity context enable high-fidelity alerts, rapid investigation timelines, and automated responses to reduce incident response time.

Founded by identity-security experts, Breez delivers streamlined identity-centric workflows that help organizations enforce least privilege, detect spear-phishing, and investigate cloud misconfigurations or supply-chain risks quickly and effectively.

Send data to Hunters

Breez Security Logs

To connect Breez Security Logs :

  1. Please follow these:

    📘Note

    When performing the last part of the process (Provide information to Hunters), follow these steps:

    1. Navigate to Data > Data Sources, and then click + Connect Data Sources.

    2. Search for Breez and click Connect.

    3. From the side-menu, click + More Integrations and then select PAN VIA S3 LIST → Breez Security Log


Expected format

Logs are expected in JSON format.

{
  "access_key_id": "ABCED1223465JNKJKKA",
  "acknowledgement_details": null,
  "acknowledgement_status": "PENDING_ACKNOWLEDGEMENT",
  "alert_id": "abcd123-1234-4390-b8f1-123a8vcd",
  "alert_snapshot": null,
  "alert_status": "OPEN",
  "alert_timestamp": "2024-10-12-04-29-53.777566",
  "alert_type": "Customer",
  "api_name": "DeleteBucket",
  "api_status": "Success",
  "breez_event_id": "123abcd-0b6a-abcd-b438-abcd121f72",
  "breez_event_timestamp": "1728707090087",
  "breez_identity_type": "machine",
  "breez_timestamp": "2024-10-12-04-29-53.777566",
  "client_id": "3a9a08a2-20b1-11ee-8a6f-5a5a58032620",
  "cloud_account_id": "240774922464",
  "cloud_account_name": "workload-dev-abcd",
  "cloud_region": "us-west-2",
  "data_source": "AWS",
  "details": null,
  "error_details": null,
  "event_source": "s3.amazonaws.com",
  "event_time": "2024-10-12T04:23:51Z",
  "geo_data": {
    "city": "Dublin",
    "country": "Ireland",
    "ip": "12.12.1.123",
    "latitude": "53.3331",
    "longitude": "-6.2489",
    "region": "Leinster"
  },
  "identity_type": "AssumedRole",
  "modified_by": null,
  "operation": "Delete",
  "policy_type": "Data Exfilteration",
  "principal_arn": "9876543234",
  "priority": "CRITICAL",
  "remediation": "",
  "remediation_message": "",
  "resource": "s3-batch-abc-spotn-sample-partners-assets-112233445566",
  "resource_details": [],
  "role_arn": "arn:aws:iam::112233445566:role/SpaceLift-Administrator-Access",
  "role_chain": "arn:aws:iam::112233445566:role/SpaceLift-Administrator-Access->123456789",
  "rule_description": "A S3 bucket was deleted from an unknown location.",
  "rule_id": "123abc-abcd-47d3-9390-123456",
  "rule_name": "A bucket was deleted from unknown location",
  "rule_type": "RULE",
  "session_name": "services-samplehandler-1234",
  "silent_alerts_dataset": null,
  "source_ip_address": "11.21.2.211",
  "sub_resources": "NONE",
  "user_agent": "[APN/1.0 HashiCorp/1.0 Terraform/1.5.7 (+https://www.terraform.io) terraform-provider-aws/5.71.0 (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go-v2/1.32.2 os/linux lang/go#1.23.2 md/GOOS#linux md/GOARCH#amd64 api/s3#1.65.2]"
}