Unauthorized activity detected

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Sensitive action that should be admin-only was performed by an unauthorized actor.

This may be caused either by incomplete integration of our SDK, or by a broken authentication flow in your system.

This may allow unauthorized actors to break your trust model and perform destructive actions, access sensitive data and otherwise break assumptions you have on what a user is allowed to do.

Strategy

Compare the role provided when tagging the user with the required_role metadata set in activity.sensitive user events.

If the required_role is set to admin but no user is provided or the provided user doesn’t have role set to admin, a Medium signal is generated.

The rule only match against hard-coded values, rather than directly compare the two fields. If you wish to use another (or multiple) values for either field, you can clone the rule and update it.

Do note that this rule require role to be set if a user is provided. The lack of a role metadata won’t trigger this signal.

Triage and response

  1. Investigate the user activity to validate that it was authorized.
  2. Investigate the route where the signal triggered to understand if the issue is caused by an authentication bug, or an incorrect integration.
  3. Consider blocking the malicious IPs until you can update the route.
PREVIEWING: mcretzman/DOCS-9337-add-cloud-info-byoti