Asana role change to admin or super-admin detected

This rule is part of a beta feature. To learn more, contact Support.

Set up the asana integration.

Goal

Identify role changes to admin or super-admin, as these could indicate privilege escalation attempts or improper access assignments.

Strategy

This rule monitors log events specifically for changes where roles are elevated to admin or super-admin. It aims to detect unauthorized access or misconfigurations that could impact system security.

Triage and response

  1. Examine the logs to identify the user {{@usr.email}} whose role was changed to admin or super-admin and determine the initiator of the change {{@resource.email}}.
  2. Confirm if the role change was expected or authorized by consulting relevant stakeholders or referring to change management records.
  3. Analyze whether the user or initiator has recently engaged in unusual or high-risk activities, which could indicate a compromised account or intentional misuse.
  4. If the role change is unauthorized, consider reverting the role, notifying affected parties, and initiating a security review.