
Summary
The Slack SSO Settings Changed detection rule identifies unauthorized modifications to Single Sign-On (SSO) configurations within a Slack workspace. This high-severity rule is essential for maintaining the integrity of authentication processes, as unauthorized access or changes can lead to credential theft or the establishment of persistent unauthorized access. The rule is triggered when an action logged in Slack's audit logs indicates that the SSO settings have been altered. Such changes can be indicative of malicious activity, potentially allowing attackers to manipulate authentication mechanisms to gain access to sensitive user data or systems. The monitoring of SSO settings is crucial due to the central role these settings play in overall organizational security. This detection is designed to promptly alert security teams to such changes, enabling immediate investigation and response.
Categories
- Cloud
- Identity Management
- Web
Data Sources
- Application Log
- Cloud Service
ATT&CK Techniques
- T1556
- T0123
Created: 2022-09-02