Cloud monitoring, log management, and SIEM tools provider Sumo Logic is urging customers to change credentials following the discovery of a security breach.
The company revealed on Tuesday that a “potential security incident” discovered on November 3 involved unauthorized access to a Sumo Logic AWS account through the use of compromised credentials.
There is no indication that the company’s systems, networks, or customer data have been impacted. However, users have been advised to “rotate credentials that are either used to access Sumo Logic or that you have provided to Sumo Logic to access other systems”.
The most urgent are API access keys, but as a precaution users should also change Sumo Logic installed collector credentials, third-party credentials stored with Sumo, and user passwords for Sumo accounts.
Sumo Logic said its investigation is ongoing and it will directly notify customers if it discovers malicious access to accounts.
“Immediately upon detection we locked down the exposed infrastructure and rotated every potentially exposed credential for our infrastructure out of an abundance of caution. We are continuing to thoroughly investigate the origin and extent of this incident. We have identified the potentially exposed credentials and have added extra security measures to further protect our systems,” the company said in its security notice.