
Summary
This rule monitors third-party integrations and OAuth-connected applications accessing Salesforce, providing oversight on potentially unauthorized data access and shadow IT. The rule's detection mechanism triggers on connected app usage events while adjusting severity based on higher risks associated with specific connection types (such as refresh tokens), app authorization events, and noteworthy app naming patterns that may indicate suspicious activity. The rule outlines critical actions in its runbook, guiding the user to verify app legitimacy, review OAuth scopes, check for expected source IP addresses, investigate user intents, and take necessary actions if any unauthorized or suspicious behavior is detected. Mitigation strategies include revoking OAuth tokens, reviewing accessed data, and possibly disabling connected apps that are no longer deemed necessary, fostering a more secure integration environment.
Categories
- Cloud
- Web
- Application
Data Sources
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1199
- T1098
- T1550
- T1528
Created: 2026-01-23