heroui logo

Cisco Duo Policy Bypass 2FA

Splunk Security Content

View Source
Summary
This detection rule monitors for changes in Cisco Duo access policies that could weaken two-factor authentication (2FA) controls. By tracking Duo administrator activity logs, it identifies when a policy is created or modified to permit access without the necessary 2FA. The analytic searches for specific actions related to policy updates or creations, looking for any entry where the authentication status is set to 'Allow access without 2FA'. This behavior could indicate potential malicious activity or insider threats that weaken an organization's security. Bypassing 2FA drastically lowers security, increasing the likelihood of unauthorized access to sensitive data and systems. Therefore, this rule is crucial for Security Operations Centers (SOCs) to detect such policy changes promptly, enabling them to mitigate risks of account compromise and broader security breaches.
Categories
  • Identity Management
  • Cloud
  • Application
Data Sources
  • Domain Name
  • User Account
  • Application Log
ATT&CK Techniques
  • T1556
Created: 2025-07-08