Jumpcloud admin login without MFA

jumpcloud

Classification:

compliance

Tactic:

Technique:

Framework:

cis-aws

Control:

4.2

Set up the jumpcloud integration.

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when a JumpCloud administrator authenticates without multi-factor authentication (MFA) enabled. This is not indicative of malicious activity, however as a best practice, administrator accounts should have MFA enabled.

Strategy

This rule monitors JumpCloud audit logs to detect when an admin user successfully authenticates to JumpCloud and the log indicates that @mfa is false.

Triage and response

  1. Reach out to the {{@usr.name}} to determine if the login was legitimate.
  2. If the login was legitimate, request that the user enables MFA.
  3. If the login wasn’t legitimate, rotate the credentials, enable MFA and triage an actions uncovered from step 1.
  4. Review all user accounts to ensure MFA is enabled.