
Summary
The rule 'Salesforce Admin Login As User' aims to detect whenever a Salesforce administrator logs in as another user. This behavior, while allowed for legitimate support purposes, can signify a security risk if abused. The rule works by monitoring login events and differentiating between normal login events and 'Login As' events, which are specifically triggered when an admin assumes another user's identity. The detection engine looks for specific log entries where the event type is 'LoginAs' and cross-references this with user IDs and names to generate alerts appropriately. The rule is designed to provide informational alerts (severity level INFO) to the security team, prompting them to investigate these actions, particularly if the behavior appears unusual or unauthorized. The built-in runbook provides guidance for further investigation via USER_ID searches, allowing for a deeper analysis of the user whom the admin has assumed. In conclusion, while this monitoring can aid in validating proper usage of admin privileges, it also necessitates a thorough follow-up by security personnel in case of any flags raised by the detection.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2023-05-09