heroui logo

Auth0: User management warning events

Anvilogic Forge

View Source
Summary
This detection rule monitors for warning events related to user management operations on the Auth0 platform. The criteria for detection include any logs that contain 'wum' or logs specifically flagged as warnings during user management activities. The rule aims to identify potential security issues such as misconfigurations, unauthorized access attempts, or suspicious modifications to user accounts. By capturing these warning events, organizations can proactively mitigate risks associated with privilege escalation or account takeovers. The Splunk logic provided integrates these events into a table format, which includes relevant fields such as session ID, action taken, user involved, source IP, and HTTP user agent, enabling detailed analysis of the events over time. This rule aligns with the MITRE ATT&CK techniques for account manipulation and privilege escalation.
Categories
  • Identity Management
  • Cloud
Data Sources
  • User Account
  • Process
ATT&CK Techniques
  • T1098
Created: 2025-02-28