
Summary
The rule 'A User's Panther Account was Modified' is designed to detect changes to user accounts within the Panther application environment. It specifically monitors for actions that modify a user's role, email, or other associated attributes. Given the fact that user roles and credentials are crucial for maintaining access control, detecting unauthorized modifications is vital for preserving security and operational integrity. The rule operates by analyzing audit logs from the Panther system, specifically monitoring logs for actions that indicate a successful creation or modification of user-related data. The rule flags any incidental changes as high severity, given the potential implications of unauthorized privilege escalation or account compromise. This detection inclusive of various conditions such as changes made by admins, system accounts, and even automatic modifications through SCIM provisioning indicates its thoroughness in ensuring user management integrity. The actionable response in the accompanying runbook advises administrators to validate any detected modifications to assess their legitimacy and intent.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1098
Created: 2022-11-21