heroui logo

Crowdstrike Admin With Duplicate Password

Splunk Security Content

View Source
Summary
The rule identifies security risks associated with administrative users in CrowdStrike who have been flagged for utilizing duplicate passwords. With access to critical systems, admin accounts pose a significant security threat if their credentials are not unique. These duplicate passwords can lead to unauthorized access, compromised accounts, and potential data breaches. The rule leverages alerts from CrowdStrike regarding duplicate password risks, marking instances where multiple admin accounts share the same password. The detection logic uses the `crowdstrike_identities` data source to filter for admin accounts, assess their risk status, and summarize findings by domain and user. The rule emphasizes the necessity of enforcing unique passwords for administrative roles, to uphold robust security measures within the organization.
Categories
  • Endpoint
Data Sources
  • User Account
  • Cloud Service
ATT&CK Techniques
  • T1110
Created: 2024-11-13