heroui logo

Slack Organization Created

Panther Rules

View Source
Summary
This rule detects the creation of a Slack organization by monitoring Slack audit logs for a specific action. The detection logic focuses on identifying an event where an organization is created, which is crucial for auditing new accounts that could be associated with potential malicious activity. By capturing details such as the actor (the user who performed the action), their email, and the IP address from which they acted, this rule enables organizations to maintain visibility over critical changes within their Slack environment. Its low severity level suggests that while it’s noteworthy, the creation of an organization may not immediately indicate malicious intent but requires monitoring as part of overall threat management. The rule is designed to trigger whenever a new organization creation event is observed, making it essential for compliance and security oversight in environments where Slack is utilized as a communication tool.
Categories
  • Cloud
  • Application
Data Sources
  • Logon Session
  • Application Log
  • Cloud Service
ATT&CK Techniques
  • T1136
  • T0123
Created: 2022-09-02