Salesforce previously unseen network for application OAuth token login

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects Salesforce OAuth token authentication from previously unseen network domains.

Strategy

This rule monitors Salesforce login events where @evt.name is Login or LoginEvent with @login_sub_type containing oauthrefreshtoken or OAuth Refresh Token and @login_type is Remote Access 2.0. It uses new value detection to identify when applications authenticate from network domains @network.client.geoip.as.domain that have not been previously observed for that specific application. OAuth refresh tokens are long-lived credentials that allow applications to maintain access without user interaction, making them attractive targets for attackers who have compromised application credentials or stolen tokens from legitimate applications.

Triage & Response

  • Examine the network domain and geographic location associated with the new OAuth token usage for {{@application}} to determine if it represents a legitimate deployment or suspicious activity.
  • Review the application’s typical usage patterns and authorized deployment locations to verify if the new network is expected.
  • Check if there have been recent changes to the application’s infrastructure, deployment, or hosting providers that would explain the new network domain.
  • Analyze the timing of the OAuth token usage to identify any correlation with suspicious user activity or potential credential compromise.
  • Verify with the application owner or development team whether the OAuth token usage from the new network domain was authorized.