
Summary
The rule monitors for sign-in attempts to 1Password accounts from unusual or unapproved clients. When a user attempts to access their account using a client that does not match the known trusted clients (such as specific versions of the 1Password app), the system raises an alert. This enhances security by detecting potential credential theft or unauthorized access. The rule captures successful log entries linked to sign-in attempts, whereby the client application used is analyzed. If a match is found against known undesirable clients, the detection is triggered, potentially indicating a compromised credential or misuse of an account. The deduplication period for alerts helps in managing incidents where repeated attempts might originate from the same source within a short time frame, while also ensuring that only unique incidents get logged. This rule is set to medium severity, indicating a moderate risk level that requires attention but may not require immediate response compared to high-severity alerts.
Categories
- Identity Management
- Application
- Cloud
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1555
Created: 2022-09-02