
Summary
The detection rule monitors updates to post-login action flows in an Auth0 organization’s tenant. Auth0 allows for custom action flows where developers can execute certain scripts or functions immediately after a user logs in, enhancing user experiences or enforcing security measures like multi-factor authentication. This rule is particularly tailored to detect unauthorized or potentially malicious updates made to these triggers, which may include adding, modifying, or removing actions without proper authorization. The rule collects information from Auth0 events when users with specific permissions (like app developers) execute changes to these flows. It reports findings with a severity level of medium, implying that while these actions could be legitimate as part of normal operations, there's substantial risk associated if done maliciously.
Categories
- Cloud
- Identity Management
- Application
Data Sources
- User Account
- Application Log
- Cloud Service
Created: 2023-06-22