Salesforce
Salesforce - Leading CRM platform for managing customer relationships and sales.
Provider: Salesforce
Detection Rule | MITRE Tactic | MITRE Technique | Criticality | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Suspicious Login Activity | Initial Access | Valid Accounts (T1078) | High | ||||||||
|
|||||||||||
Phishing Attempts | Credential Access | Phishing (T1566) | High | ||||||||
|
|||||||||||
Sensitive Data Exfiltration | Exfiltration | Exfiltration Over Command and Control Channel (T1041) | High | ||||||||
|
|||||||||||
Data Manipulation | Integrity | Data Manipulation (T1565) | Medium | ||||||||
|
|||||||||||
Unusual Email Activity | Discovery | Account Discovery (T1087) | Medium | ||||||||
|
|||||||||||
Anomalous API Calls | Command and Control | Application Layer Protocol (T1071) | Medium | ||||||||
|
|||||||||||
Excessive Permissions Review | Privilege Escalation | Access Token Manipulation (T1550) | Low | ||||||||
|
APIs and Their Scopes
Detection Rule | API Required | API Scope |
---|---|---|
Suspicious Login Activity | /services/data/vXX.0/query/ | api, full |
Phishing Attempts | /users/{userId}/messages | Mail.Read, Mail.ReadWrite, Mail.ReadBasic |
Sensitive Data Exfiltration | /users/{userId}/messages | Mail.Read, Mail.ReadWrite, Mail.ReadBasic |
Unauthorized Access to Salesforce | /services/data/vXX.0/sobjects/User/{userId} | api, full, refresh_token |
Data Manipulation | /services/data/vXX.0/query/ | api, full |
Unusual Email Activity | /users/{userId}/messages | Mail.Read, Mail.ReadWrite, Mail.ReadBasic |
Anomalous API Calls | /services/data/vXX.0/sobjects/{objectName}/ | api, full |
Excessive Permissions Review | /services/data/vXX.0/sobjects/User | api, full, refresh_token |
Reports and Widgets for CISO
Report Name | Widgets | Description |
---|---|---|
Login Activity Report | Total logins (daily/weekly) | Overview of user login activities to Salesforce and Outlook. |
Failed login attempts Login locations (map visual) |
||
Email Phishing Report | Count of flagged phishing emails | Summary of phishing attempts detected in user inboxes. |
Affected users Email sources (top domains) |
||
Sensitive Data Exfiltration Report | Count of sensitive emails sent | Instances of sensitive data being sent via email. |
Top users sending sensitive data Data types (categories) |
||
Unauthorized Access Report | Number of unauthorized access attempts | Overview of unauthorized access attempts to Salesforce. |
Affected user accounts Time of occurrence (timeline visual) |
||
Data Manipulation Report | Count of data changes | Changes made to sensitive customer data in Salesforce. |
Users making changes Before-and-after comparison visual |
||
Unusual Email Activity Report | Email volume over time (line graph) | Identify spikes or anomalies in email usage. |
Top users by email volume Outlier detection (highlight unusual patterns) |
||
Anomalous API Calls Report | Count of API calls by endpoint | Monitor API usage and identify any anomalies. |
Success vs. failure rate Top users making API calls |
||
Excessive Permissions Review Report | Count of users with elevated permissions | Overview of user permissions and any discrepancies. |
Role changes over time Permissions by user role (bar graph) |