
Summary
This detection rule targets failed WebAuthn enrollment attempts in the Auth0 authentication platform. WebAuthn, a web standard for passwordless authentication, can be exploited by threat actors aiming to register unauthorized devices to compromised accounts. However, failed attempts can indicate security controls in place, misconfigurations, or lack of the necessary credentials. By identifying and logging events related to these failures, the rule facilitates early detection of potential attacks or legitimate user issues during the enrollment of WebAuthn devices. The logic utilizes Splunk to fetch authentication data, filtering for specific event types and summarizing the results by user and time, which helps in monitoring for unusual patterns in device registrations.
Categories
- Identity Management
- Cloud
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1098.005
Created: 2025-02-28