heroui logo

Slack MFA Settings Changed

Panther Rules

View Source
Summary
The rule 'Slack MFA Settings Changed' is designed to detect changes to Multi-Factor Authentication (MFA) settings within Slack. MFA is a critical security feature that adds an additional layer of protection to user accounts. This rule monitors Slack Audit Logs for specific actions indicating that a user has changed their MFA settings. It flags any instances where the action 'pref.two_factor_auth_changed' occurs, thus helping organizations to respond quickly to suspicious modifications that could signify unauthorized access or attempts to bypass security measures. The detection logic includes verification of the actor's identity, the IP address used during the action, and the context in which the change was made—including information such as the user agent string and associated Slack workspace. Additionally, a 'User Logout' action is checked to ensure that changes are not just incidental logout events, enhancing the rule's precision in identifying relevant MFA changes. Alerts generated from this rule are categorized as high severity, indicating the importance of rapid response to such changes to maintain security integrity.
Categories
  • Cloud
  • Web
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Cloud Service
ATT&CK Techniques
  • T1556.006
  • T0123
Created: 2022-09-02