Jumpcloud admin login without MFA

jumpcloud

Classification:

compliance

Tactic:

Technique:

Framework:

cis-aws

Control:

4.2

Set up the jumpcloud integration.

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when a JumpCloud administrator authenticates without multi-factor authentication (MFA) enabled. This is not indicative of malicious activity, however as a best practice, administrator accounts should have MFA enabled.

Strategy

This rule monitors JumpCloud audit logs to detect when an admin user successfully authenticates to JumpCloud and the log indicates that @mfa is false.

Triage and response

  1. Reach out to the {{@usr.name}} to determine if the login was legitimate.
  2. If the login was legitimate, request that the user enables MFA.
  3. If the login wasn’t legitimate, rotate the credentials, enable MFA and triage an actions uncovered from step 1.
  4. Review all user accounts to ensure MFA is enabled.
PREVIEWING: mervebolat/span-id-preprocessing