
Summary
The Slack Anomaly Detected rule identifies potential anomalies in user behavior within the Slack application, specifically focusing on audit logs. This rule aims to detect instances where unusual or unexpected actions are taken by users, indicating possible security incidents such as unauthorized access or account compromises. The detection criteria are based on specific log actions classified as 'anomaly' and involve checks against user activity, including session fingerprints and actions taken from unusual IP addresses or locations. If such anomalies are detected more than the defined threshold (1), an alert is triggered. The rule is configured to run every 60 minutes and has a low severity level, suggesting that while these anomalies warrant attention, they may not indicate an immediate threat. It also leverages MITRE ATT&CK mappings to enhance its detection capabilities, particularly under the technique of Application Layer Protocol utilization.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1071
- T0123
Created: 2022-09-02