Privilege escalation alerts on tty sessions are not noise. They are signals that someone is trying to gain more power on a system than they should. Detecting and acting on these alerts is the difference between stopping an intrusion early and handing over your crown jewels.
When a user gains privileged access through sudo, su, or other escalation paths in a tty, the activity leaves traces. Smart logging and alerting make those traces visible in real time. Without that visibility, malicious activity can hide inside normal system use.
The core of strong detection is tight auditing of shell activity. Every time privilege escalation hits a tty session, capture it. Record who did it, when, from where, and under which process. Make alerts fast, detailed, and impossible to ignore. Push them to the right people immediately. Delay kills response time.
Common triggers for tty privilege escalation alerts include failed sudo attempts, unexpected root shells, privilege escalation in restricted containers, and commands executed by service accounts. Each of these deserves an alert because each could mean a compromised account, a misconfigured system, or an active attacker.