OneLogin API activity from malicious IP address

Set up the onelogin integration.

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect and investigate OneLogin API activity originating from suspicious IP addresses, which may indicate potential unauthorized access attempts or malicious API interactions.

Strategy

This rule monitors activities within OneLogin, focusing specifically on actions initiated by users via the API. It flags activities where the source IP address has been identified with suspicious or malicious indicators, such as associations with botnet proxies, known malicious intent, or anonymization services like Tor.

Triage and Response

  1. Verify user activity: Check if the user associated with the alert ({{@usr.name}}) has a legitimate reason for API interactions from the flagged IP.

  2. Investigate suspicious IP:

    • Review logs related to the flagged IP to determine if it has been involved in other potentially malicious actions.
    • Use threat intelligence sources or IP investigation tools to gather context on the flagged IP’s reputation and any recent malicious activity.
  3. Containment and remediation:

    • If the activity is confirmed unauthorized, consider blocking the IP address at the network level.
    • Review and rotate API keys or admin credentials associated with the suspicious activity to prevent further unauthorized access.