Skip to content

Threat Detection Rules

Threat detection rules are sets of predefined criteria and conditions used to identify potential security threats within a system or network.

Hydden Threat Score Architecture

How Threat Scores Work

Hydden uses threat rules to generate a Threat Score (0–100) for every discovered account. The score is the sum of 8 category totals, each capped at a maximum of 10 points. Category totals are calculated by aggregating the individual rule scores that match on a given account.

The 8 scoring categories are:

CategoryMax ScoreDescription
Account Activity10Stale accounts, failed login attempts
Account Statistics10Z-Score group membership deviations
Breach Data10Accounts affected by public breaches
Expired Accounts10Aggregated expiration data
Group Membership10Excessive group memberships
Owner Mapping10Unmapped, shared, or orphaned accounts
Password & Security10MFA status, password age, password hygiene
Privilege10Privileged groups, roles, unvaulted access
Total Threat100Sum of all category totals

Threat Score Ranges

Hydden classifies threat scores into three severity levels:

RangeSeverityDescription
0–24.99LowMinimal risk indicators
25–74.99ModerateOne or more categories contributing elevated risk
75–100CriticalMultiple high-risk categories; immediate attention recommended

Detection-Only vs Scored Rules

Detection-Only Rules

Some threat rules are configured as detection-only. These rules identify and flag matching accounts in reports but do not contribute to the account's threat score. Detection-only rules are useful for monitoring trends (e.g., password age 180+ days) without inflating scores.

Scored rules contribute their configured score value to the relevant category total when they match on an account. Both rule types appear in Search Library reports when Show in Reports is enabled.

Aggregation Methods

The Total Threat aggregation rule combines the 8 category totals into a single account-level score. The aggregation method can be configured to one of three options:

MethodDescription
Totals Average (default)Averages the 8 category totals to produce the final score
MaximumUses the highest single category total as the final score
Weighted AverageApplies configurable weights to each category before averaging

NOTE

Contact Hydden Support to change the aggregation method for your tenant.

Aggregation rules then combine account-level threat scores to produce owner-level and tenant-level threat scores.

Tips to Improve Your Score

Use the Search Library to run reports with filters to identify categories and/or individual rules that negatively impact each account.

Target rules and categories with the highest values first for the greatest impact on reducing threat scores. Start from owners with high threat scores. Then drill into accounts, then categories to find the most impactful rules.

Supported Compliance Frameworks

Threat rules can be mapped to compliance framework controls. The following frameworks are supported:

FrameworkDescription
NIST CSF V2.0NIST Cybersecurity Framework Version 2.0
CISCenter for Internet Security Controls
CRITIER4V2CRITIER Framework Version 2

Each rule can reference a specific framework and control function (e.g., NIST CSF V2.0 / PR.AA-05).

Rule Properties Reference

Each threat detection rule supports the following configuration properties:

PropertyDescription
NameDescriptive name for the rule
ScoreImpact value (0–10) contributed to the category total
Propagation TypeHow scores aggregate: max (highest match wins) or sum (all matches added)
Show in ReportsWhether the rule appears in Search Library reports
Show in ImpactWhether the rule contributes to the Identity Posture threat score
DisabledWhether the rule is inactive (present but not evaluated)
Detection OnlyWhether the rule flags accounts without contributing to the score
Is AlertWhether the rule triggers an alert notification
Is RepeatableWhether the rule can trigger multiple times for the same account
Allow Workflow TriggerWhether the rule can trigger automated workflows
Platform FilterRestricts the rule to specific platforms
Data Source FilterRestricts the rule to specific data sources
FrameworkCompliance framework reference (e.g., NIST CSF V2.0)
FunctionSpecific framework control function (e.g., PR.AA-03)
RecommendationSuggested remediation action for matching accounts

Hydden Documentation and Training Hub