
Summary
This rule detects the creation or modification of SAML connectors within a Teleport cluster, which is a critical action that can impact the security and trust model of the environment. SAML (Security Assertion Markup Language) is often used in SSO (Single Sign-On) solutions, and any changes to its configuration could permit or restrict user access and the overall management of authentication. This rule helps ensure that such changes are tracked and validated to prevent unauthorized access or misconfigurations that could lead to security vulnerabilities. It is set to monitor logs from the Gravitational Teleport Audit trail and will trigger alerts for activities associated with SAML connectors. An example test log indicates that a SAML authentication connector was created by a specific user at a defined time, which would be logged for further validation.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1585
- T8200
Created: 2023-11-27