Salesforce previously unseen network for application OAuth token login

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detects Salesforce OAuth token authentication from previously unseen network domains.

Strategy

This rule monitors Salesforce login events where @evt.name is Login or LoginEvent with @login_sub_type containing oauthrefreshtoken or OAuth Refresh Token and @login_type is Remote Access 2.0. It uses new value detection to identify when applications authenticate from network domains @network.client.geoip.as.domain that have not been previously observed for that specific application. OAuth refresh tokens are long-lived credentials that allow applications to maintain access without user interaction, making them attractive targets for attackers who have compromised application credentials or stolen tokens from legitimate applications.

Triage & Response

  • Examine the network domain and geographic location associated with the new OAuth token usage for {{@application}} to determine if it represents a legitimate deployment or suspicious activity.
  • Review the application’s typical usage patterns and authorized deployment locations to verify if the new network is expected.
  • Check if there have been recent changes to the application’s infrastructure, deployment, or hosting providers that would explain the new network domain.
  • Analyze the timing of the OAuth token usage to identify any correlation with suspicious user activity or potential credential compromise.
  • Verify with the application owner or development team whether the OAuth token usage from the new network domain was authorized.