OneLogin User Assumed Another User
Detects when an user assumed another user account.
Sigma rule (View on GitHub)
1title: OneLogin User Assumed Another User
2id: 62fff148-278d-497e-8ecd-ad6083231a35
3status: test
4description: Detects when an user assumed another user account.
5references:
6 - https://developers.onelogin.com/api-docs/1/events/event-resource
7author: Austin Songer @austinsonger
8date: 2021-10-12
9modified: 2022-12-25
10tags:
11 - attack.impact
12logsource:
13 product: onelogin
14 service: onelogin.events
15detection:
16 selection:
17 event_type_id: 3
18 condition: selection
19falsepositives:
20 - Unknown
21level: low
References
Related rules
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- AWS EC2 Disable EBS Encryption
- AWS EFS Fileshare Modified or Deleted
- AWS EFS Fileshare Mount Modified or Deleted