Changes made to an existing user, service, or machine account, including alterations to attributes, permissions, roles, authentication methods, or group memberships.
Data Collection Measures:
/var/log/auth.log, /var/log/secure – Tracks account modifications (usermod, chage, passwd).useradd, usermod, gpasswd).users table for recent modifications.ModifyUser, UpdateLoginProfile – Captures changes to IAM user attributes.AttachUserPolicy, AddUserToGroup – Detects policy and group modifications.| Name | Channel |
|---|---|
| auditd:SYSCALL | usermod, groupmod, passwd |
| auditd:SYSCALL | SYSCALL for usermod or /etc/group file modification |
| auditd:SYSCALL | usermod, or account rename system calls |
| AWS:CloudTrail | UpdateLoginProfile |
| AWS:CloudTrail | AttachUserPolicy, CreatePolicyVersion, PutRolePolicy |
| AWS:CloudTrail | AttachUserPolicy |
| AWS:CloudTrail | CreateAccessKey |
| AWS:CloudTrail | role privilege expansion detected |
| azure:audit | Operation IN ("Add device", "Add registered users to device", "Add registered owner to device") |
| azure:audit | Add member to role |
| azure:audit | Rename user |
| azure:audit | Add service principal credentials, app password added, app role assignment |
| azure:policy | DisableMfaPolicy or change to ConditionalAccess rules |
| azure:signinLogs | unusual role assumption or elevation path |
| gcp:audit | Admin Activity > Role Change or Sharing Change |
| gcp:audit | google.iam.admin.v1.RoleAssignment |
| gcp:audit | Set Gmail Delegation |
| gcp:audit | iam.serviceAccounts.keys.create, os-login.sshPublicKeys.add |
| gcp:audit | API Key Created, OAuth Client Registered |
| kubernetes:audit | create or update events for RoleBinding or ClusterRoleBinding objects |
| linux:syslog | sudo or su access prior to content change |
| m365:audit | Add member to role, Add app role assignment |
| m365:unified | Admin Activity > Role Change or Sharing Change |
| m365:unified | Set-ADUser OR Set-ADAccountControl |
| m365:unified | User excluded from MFA or MFA method registered |
| m365:unified | Add member to role, Set-Mailbox |
| m365:unified | Set-MailboxAuditBypassAssociation or disabling Advanced Auditing |
| m365:unified | New agent registration by non-admin user |
| m365:unified | Add-MailboxPermission, UpdateFolderPermissions |
| m365:unified | Set-Mailbox, Set-InboxRule, Set-MailboxFolderPermission |
| macos:unifiedlog | com.apple.accountsd, com.apple.opendirectoryd |
| macos:unifiedlog | Process execution or directory service changes |
| Okta:SystemLog | user.account.privilege.grant |
| saas:okta | User Attribute Modified / Role Assignment Changed |
| saas:okta | user.lifecycle.delete, user.account.lock |
| saas:okta | admin role granted outside approved workflows |
| saas:zoom | DisableMFA or RegisterNewFactor |
| WinEventLog:DirectoryService | EventID 5136 |
| WinEventLog:Security | EventCode=4738, 4728, 4670 |
| WinEventLog:Security | EventCode=4723, 4724, 4726, 4740 |
| WinEventLog:Security | EventCode=4704 |
| WinEventLog:Security | EventCode=4728, 4729, 4732, 4733, 4756, 4757 |