Asana
Asana - Project management tool for planning and tracking work.
Provider: Asana
Detection Rule | MITRE Tactic | MITRE Technique | Criticality | ||||
---|---|---|---|---|---|---|---|
Unauthorized Project Creation | Initial Access | Valid Accounts (T1078) | Medium | ||||
|
|||||||
Suspicious Task Assignment to Admins | Privilege Escalation | Exploitation of Access Controls (T1068) | High | ||||
|
|||||||
High Volume Task Deletion | Defense Evasion | Indicator Removal on Host (T1070) | High | ||||
|
|||||||
Unauthorized Access to Private Projects | Persistence | Valid Accounts (T1078) | High | ||||
|
|||||||
Bulk Project Sharing with External Domains | Exfiltration | Exfiltration Over Web Services (T1567.002) | High | ||||
|
|||||||
API Token Misuse for Unauthorized Automation | Execution | Use Alternate Authentication Material (T1550.003) | High | ||||
|
|||||||
Unauthorized Custom Fields Creation | Persistence | Create or Modify System Process (T1543) | Medium | ||||
|
|||||||
Mass Task Reassignment to External Users | Exfiltration | Account Manipulation (T1098) | Medium | ||||
|
|||||||
Suspicious App Integration | Initial Access | Trusted Relationship (T1199) | High | ||||
|
|||||||
Unauthorized Project Deletion | Impact | Data Destruction (T1485) | High | ||||
|
|||||||
Privilege Escalation via Admin Role Assignment | Privilege Escalation | Valid Accounts (T1078) | High | ||||
|
|||||||
Task Comments Containing Sensitive Data | Exfiltration | Data Staged: Local Data Staging (T1074.001) | Medium | ||||
|
|||||||
Unauthorized Change in Project Ownership | Persistence | Account Manipulation (T1098) | High | ||||
|
APIs and Their Scopes
Detection Rule | Required API | API Scopes |
---|---|---|
UUnauthorized Project Creation | Projects API | default (read/write projects) |
Suspicious Task Assignment to Admins | Tasks API | default (read/write tasks) |
High Volume Task Deletion | Tasks API | default (read/write tasks) |
Unauthorized Access to Private Projects | Projects API | default (read/write projects) |
Bulk Project Sharing with External Domains | Projects API | default (read/write projects) |
API Token Misuse for Unauthorized Automation | API Token Management | default (read/write) |
Unauthorized Custom Fields Creation | Custom Fields API | default (read/write custom fields) |
Mass Task Reassignment to External Users | Tasks API | default (read/write tasks) |
Suspicious App Integration | Apps API | default (read/write apps) |
Unauthorized Project Deletion | Projects API | default (read/write projects) |
Privilege Escalation via Admin Role Assignment | Teams API | default (read/write teams) |
Task Comments Containing Sensitive Data | Tasks API | default (read/write tasks) |
Unauthorized Change in Project Ownership | Projects API | default (read/write projects) |
Reports and Widgets for CISO
Report Name | Widgets | Description |
---|---|---|
Unauthorized Project Activities | Bar chart of unauthorized projects created/deleted | Summary of unauthorized project creations, deletions, and access changes. |
List of recent unauthorized access events Heatmap of project activity by user |
||
Task Management Overview | Pie chart of tasks assigned by role | Overview of task assignments and changes, highlighting suspicious patterns. |
List of recent unauthorized access events Heatmap of project activity by user |
||
Sensitive Data Exposure | Number of sensitive comments flagged | Overview of task comments or files containing sensitive data. |
List of tasks with sensitive data Trend chart of sensitive data occurrences over time |
||
API Token Usage Audit | Line graph of API token usage over time | Analysis of API token usage to detect unauthorized or suspicious activities. |
List of tokens with access violations Pie chart of API calls by user role |
||
User Access Review | List of recent role changes (admin assignments) | Summary of user access and role changes, focusing on privilege escalation. |
Bar chart of user access levels Summary table of inactive users |
||
Third-Party App Integrations | List of active integrations | Report on third-party applications integrated with Asana and their access. |
Pie chart of permissions requested by apps Line graph of new app integrations over time |
||
Task Deletion Activities | Line graph of task deletion events over time | Overview of task deletions, highlighting any mass deletions or suspicious activities. |
List of users performing deletions Bar chart of deletions by project |
||
Project Sharing Analysis | List of projects shared externally | Analysis of project sharing activities, especially with external domains. |
Pie chart of external shares by domain Heatmap of sharing activities by user |
||
Security Incident Trends | Line graph of incidents over time | Overview of security incidents related to Asana activities, tracked over time. |
Pie chart of incident types Summary table of open incidents by severity |
||
Custom Fields Usage | List of new custom fields created | Analysis of custom fields created or modified, highlighting unauthorized changes. |
Bar chart of custom fields usage by project Line graph of modifications to custom fields over time |