Unusual 1Password device authorization activity

1password

Classification:

attack

Set up the 1password integration.

Goal

Detect when a 1Password device authorization action is observed.

Strategy

This rule monitors 1Password audit logs for device authorization action that may allow an attacker to maintain persistence within a 1Password tenant.

Note: This rule uses the New Value detection method to determine when a previously unseen device authorization action is observed.

Triage & response

Investigate user {{@usr.email}} attempting an unfamiliar {{@evt.name}} device authorization action on {{@session.device_uuid}} from {{@network.client.ip}}.

PREVIEWING: mcretzman/DOCS-9337-add-cloud-info-byoti