Administrative privileges assigned to a user, group or role

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when administrative privileges are assigned to user accounts, groups, or roles.

Strategy

This rule monitors OCSF-transformed logs where @ocsf.class_uid is 3005 (User Access Management) or 3006 (Group Management) for administrative privilege assignment activities. It triggers when events include @ocsf.activity_name set to Assign Privileges and @ocsf.privileges containing ADMIN_PRIVILEGES_ASSIGNED. Administrative privilege assignments are significant security events that could indicate legitimate administrative actions or potential privilege escalation attacks. Monitoring these activities across all connected systems is critical for maintaining proper access controls.

Triage and response

  • Verify if the privilege assignment to {{@ocsf.user.name}} was authorized through your organization’s access management process.
  • Review the specific privileges granted and determine if they align with the user’s legitimate business role and responsibilities.
  • Examine the timing and context of the privilege assignment to identify if it occurred during normal business hours or as part of scheduled administrative activities.
  • Check for any concurrent suspicious activities from the same user account across connected systems and platforms.
  • Validate that the privilege assignment was performed by an authorized administrator with proper approval documentation.
  • Determine if the newly assigned privileges have been used since the assignment and review any actions taken with the elevated permissions.