1Password - Changes to SSO configuration
| Id | 9406f5ab-1197-4db9-8042-9f3345be061c |
| Rulename | 1Password - Changes to SSO configuration |
| Description | This will alert when changes have been made to the SSO configuration. Once this analytics rule is triggered it will group all related future alerts for upto an hour when all related entities are the same. Ref: https://1password.com/ Ref: https://github.com/securehats/ |
| Severity | Medium |
| Tactics | Persistence |
| Techniques | T1556 |
| Required data connectors | 1Password |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/1Password/Analytics Rules/1Password - Changes to SSO configuration.yaml |
| Version | 1.0.1 |
| Arm template | 9406f5ab-1197-4db9-8042-9f3345be061c.json |
OnePasswordEventLogs_CL
| where log_source == "auditevents"
| where action has_any("enblsso", "disblsso", "chngpsso", "chngasso", "chngdsso", "addgsso", "delgsso")
| where object_type == "sso"
| extend
ActorUsername = actor_details.email
, SrcIpAddr = session.ip
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/1Password/Analytics Rules/1Password - Changes to SSO configuration.yaml
suppressionEnabled: false
incidentConfiguration:
groupingConfiguration:
enabled: true
matchingMethod: AllEntities
lookbackDuration: 1h
reopenClosedIncident: false
createIncident: true
suppressionDuration: 5h
queryPeriod: 5m
name: 1Password - Changes to SSO configuration
eventGroupingSettings:
aggregationKind: SingleAlert
entityMappings:
- fieldMappings:
- columnName: ActorUsername
identifier: FullName
entityType: Account
- fieldMappings:
- columnName: SrcIpAddr
identifier: Address
entityType: IP
alertDetailsOverride:
alertDynamicProperties: []
version: 1.0.1
description: |-
This will alert when changes have been made to the SSO configuration. Once this analytics rule is triggered it will group all related future alerts for upto an hour when all related entities are the same.
Ref: https://1password.com/
Ref: https://github.com/securehats/
severity: Medium
id: 9406f5ab-1197-4db9-8042-9f3345be061c
tactics:
- Persistence
requiredDataConnectors:
- connectorId: 1Password
dataTypes:
- OnePasswordEventLogs_CL
queryFrequency: 5m
triggerThreshold: 0
query: |-
OnePasswordEventLogs_CL
| where log_source == "auditevents"
| where action has_any("enblsso", "disblsso", "chngpsso", "chngasso", "chngdsso", "addgsso", "delgsso")
| where object_type == "sso"
| extend
ActorUsername = actor_details.email
, SrcIpAddr = session.ip
relevantTechniques:
- T1556
kind: Scheduled
triggerOperator: gt