- 필수 기능
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- 디지털 경험
- 소프트웨어 제공
- 보안
- 로그 관리
- 관리
- 인프라스트럭처
- ci
- containers
- csm
- ndm
- otel_guides
- overview
- slos
- synthetics
- tests
- 워크플로
Tactic:
Sensitive action that should be admin-only was performed by an unauthorized actor.
This may be caused either by incomplete integration of our SDK, or by a broken authentication flow in your system.
This may allow unauthorized actors to break your trust model and perform destructive actions, access sensitive data and otherwise break assumptions you have on what a user is allowed to do.
Compare the role
provided when tagging the user with the required_role
metadata set in activity.sensitive
user events.
If the required_role
is set to admin but no user is provided or the provided user doesn’t have role
set to admin
, a Medium
signal is generated.
The rule only match against hard-coded values, rather than directly compare the two fields. If you wish to use another (or multiple) values for either field, you can clone the rule and update it.
Do note that this rule require role
to be set if a user is provided. The lack of a role
metadata won’t trigger this signal.