Detecting cloud federated credential abuse in Windows
You need to be able to detect events that indicate abuse of cloud federated credentials. These credentials are usually extracted from endpoint desktops or servers that provide federation services such as Windows Active Directory Federation Services. Identity federation relies on objects such as Oauth2 tokens, cookies, or SAML assertions in order to provide seamless access between cloud and perimeter environments. If these objects are either hijacked or forged, then attackers are able to pivot into your cloud environment.
This use case contains searches that detect abnormal processes which may indicate the extraction of federated directory objects such as passwords, Oauth2 tokens, certificates, and keys, as well as searches relating to specific O365 events.
Data required
- Microsoft
- Active Directory audit data
- Microsoft 365
- Endpoint data
How to use Splunk software for this use case
Next steps
Splunk Enterprise Security provides other searches to help reinforce your cloud security posture, including: