heroui logo

OneLogin Active Login Activity

Panther Rules

View Source
Summary
The rule 'OneLogin Active Login Activity' aims to detect instances where multiple user accounts log in from the same IP address, indicating potential lateral movement through shared or compromised credentials. The rule is categorized under medium severity as it highlights a significant security concern that could suggest misuse of accounts, especially in environments where unique user logins are expected. The primary log source involved is 'OneLogin.Events', focusing on monitoring normal and shared IP login events. The detection logic likely inspects login logs for several user accounts associating with identical IP addresses and assesses the behavior against established user patterns. If multiple accounts are observed logging in from the same IP, an investigation should be triggered to evaluate whether such behavior is legitimate or if it poses a security risk, requiring adjustments to user policies or further actions for threat mitigation. The guidance includes monitoring the associated IP address and potentially updating shared IP space parameters.
Categories
  • Identity Management
  • Cloud
Data Sources
  • User Account
  • Web Credential
ATT&CK Techniques
  • T1550
Created: 2022-09-02