Salesforce

Salesforce - Leading CRM platform for managing customer relationships and sales.

Provider: Salesforce

Detection Rule MITRE Tactic MITRE Technique Criticality
Suspicious Login Activity Initial Access Valid Accounts (T1078) High
Investigation Actions (APIs) Salesforce REST API: Retrieve user login history
Compare with Outlook access logs
Incident Creation Criteria More than 3 failed login attempts
Login from new/unusual IP addresses
Phishing Attempts Credential Access Phishing (T1566) High
Investigation Actions (APIs) Microsoft Graph API: Retrieve flagged emails
Analyze email content
Incident Creation Criteria Emails flagged as phishing
User reports receiving suspicious emails
Sensitive Data Exfiltration Exfiltration Exfiltration Over Command and Control Channel (T1041) High
Investigation Actions (APIs) Microsoft Graph API: Extract email content
Salesforce REST API: Retrieve related transactions
Incident Creation Criteria Emails sent containing sensitive data to external addresses
Data Manipulation Integrity Data Manipulation (T1565) Medium
Investigation Actions (APIs) Salesforce REST API: Retrieve transaction history
Compare against expected values
Incident Creation Criteria Unusual changes to customer data not aligned with user behavior
Unusual Email Activity Discovery Account Discovery (T1087) Medium
Investigation Actions (APIs) Microsoft Graph API: Analyze email traffic patterns
Salesforce REST API: Correlate with user activity
Incident Creation Criteria Significant increase in email volume outside normal patterns
Anomalous API Calls Command and Control Application Layer Protocol (T1071) Medium
Investigation Actions (APIs) Salesforce REST API: Monitor API call patterns
Compare with known baselines
Incident Creation Criteria API calls exceeding predefined thresholds or coming from unexpected sources
Excessive Permissions Review Privilege Escalation Access Token Manipulation (T1550) Low
Investigation Actions (APIs) Salesforce REST API: Review permissions for users
Generate alerts on high-risk permission assignments
Incident Creation Criteria Any changes in user permissions not aligned with job functions

APIs and Their Scopes

Detection Rule API Required API Scope
Suspicious Login Activity /services/data/vXX.0/query/ api, full
Phishing Attempts /users/{userId}/messages Mail.Read, Mail.ReadWrite, Mail.ReadBasic
Sensitive Data Exfiltration /users/{userId}/messages Mail.Read, Mail.ReadWrite, Mail.ReadBasic
Unauthorized Access to Salesforce /services/data/vXX.0/sobjects/User/{userId} api, full, refresh_token
Data Manipulation /services/data/vXX.0/query/ api, full
Unusual Email Activity /users/{userId}/messages Mail.Read, Mail.ReadWrite, Mail.ReadBasic
Anomalous API Calls /services/data/vXX.0/sobjects/{objectName}/ api, full
Excessive Permissions Review /services/data/vXX.0/sobjects/User api, full, refresh_token

Reports and Widgets for CISO

Report Name Widgets Description
Login Activity Report Total logins (daily/weekly) Overview of user login activities to Salesforce and Outlook.

Failed login attempts

Login locations (map visual)

Email Phishing Report Count of flagged phishing emails Summary of phishing attempts detected in user inboxes.

Affected users

Email sources (top domains)

Sensitive Data Exfiltration Report Count of sensitive emails sent Instances of sensitive data being sent via email.

Top users sending sensitive data

Data types (categories)

Unauthorized Access Report Number of unauthorized access attempts Overview of unauthorized access attempts to Salesforce.

Affected user accounts

Time of occurrence (timeline visual)

Data Manipulation Report Count of data changes Changes made to sensitive customer data in Salesforce.

Users making changes

Before-and-after comparison visual

Unusual Email Activity Report Email volume over time (line graph) Identify spikes or anomalies in email usage.

Top users by email volume

Outlier detection (highlight unusual patterns)

Anomalous API Calls Report Count of API calls by endpoint Monitor API usage and identify any anomalies.

Success vs. failure rate

Top users making API calls

Excessive Permissions Review Report Count of users with elevated permissions Overview of user permissions and any discrepancies.

Role changes over time

Permissions by user role (bar graph)