
Summary
This detection rule is designed to identify the creation of new administrator accounts in the Duo security platform. When an account is created, a log entry is generated that captures details about the new administrator, such as their name, email, role, and status. The rule specifically looks for a log entry where the action is 'admin_create' and checks expected parameters such as the username and status of the new account. If such an entry is detected, it flags it as a high-severity event, indicating that a new admin has been added to the environment, which could potentially be a point of concern for security operations. The rule also implements a deduplication period of 60 minutes to prevent redundant alerts for the same event. An anomalous or unexpected admin creation could indicate malicious activity or a misconfiguration, thus requiring immediate investigation.
Categories
- Identity Management
- Cloud
- Other
Data Sources
- User Account
- Application Log
Created: 2023-01-20