
Summary
The rule titled 'Enabled Zendesk Support to Assume Users' focuses on tracking changes in user assumption settings within Zendesk's Support environment. This capability allows Zendesk support staff to impersonate end users, which can be a critical function for troubleshooting but also poses risks related to unauthorized access or lateral movement within an organization. The detection rule highlights changes to these settings through audit logs, specifically looking for updates regarding user assumption permissions. Notably, it seeks to ensure that the feature is only enabled when necessary, reflecting a best practice in security management. If abuse or unnecessary use of this feature is detected, remediation steps suggest disabling user assumption capabilities unless explicitly needed. The severity of the rule has been categorized as 'Medium,' indicating a moderate level of risk associated with improper usage of this functionality. Furthermore, the rule references MITRE ATT&CK techniques, primarily related to credential access and lateral movement, positioning it within established cybersecurity frameworks for thorough analysis and investigation.
Categories
- Cloud
- Identity Management
- Application
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1550
Created: 2022-09-02