Skip to content

Commit 2192a97

Browse files
avanscoyYoav-Auth0nick-gagliardi
authored
First update (#421)
* First update * New project for yoav (#432) * updates for Security Center Grouping and Filtering release * updates for Security Center Grouping and Filtering release * Update security-center.mdx * Update main/docs/secure/security-center.mdx * Update main/docs/secure/security-center/security-alerts.mdx * Rename Threat Monitoring.png to Threat_Monitoring.png * Update security-center.mdx * Update security-center.mdx * Update metrics.mdx --------- Co-authored-by: Yoav-Auth0 <[email protected]> Co-authored-by: Nick Gagliardi <[email protected]>
1 parent d419131 commit 2192a97

File tree

7 files changed

+16
-64
lines changed

7 files changed

+16
-64
lines changed
Loading
134 KB
Loading
41.5 KB
Loading
560 KB
Loading

main/docs/secure/security-center.mdx

Lines changed: 8 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ title: Security Center
1010
'twitter:description': Learn about Security Center, which provides observability tools
1111
that empower you to see potential attack trends and quickly respond to them in real-time.
1212
'twitter:title': Security Center
13-
---
13+
---
1414
Security Center provides observability tools that allow you to see potential attack trends and quickly respond to them in real-time. Security Center provides real-time monitoring that allows you to observe your own Customer Identity and Access Management (CIAM) anomaly detection metrics, and lets you configure attack mitigation features from within the same space.
1515

1616
## Real-time monitoring
@@ -27,13 +27,11 @@ Security Center provides you with an overview of your tenant’s security pulse
2727

2828
Security Center allows you to filter available data to your needs.
2929

30-
You can filter data based on a time period, including:
30+
You can filter data based on the following fields:
3131

32-
* Last hour
33-
* Last 12 hours
34-
* Last day
35-
* Last 7 days
36-
* Last 14 days
32+
* Time period (up to the last 14 days)
33+
* Applications
34+
* Connections
3735

3836
Depending on the time period you select, the data is automatically aggregated per minute, per hour, or per day.
3937

@@ -73,46 +71,38 @@ We will identify patterns that are usually an indicator of known attack types an
7371

7472
</Callout>
7573

74+
<Frame>![Screenshot shows multiple line graphs for the Security Center Threat Protection tab.](/docs/images/cdy7uua7fh8z/Threat_Monitoring/Threat_Monitoring.png)</Frame>
75+
7676
#### Bot detection
7777

7878
<Tooltip tip="Bot Detection: Form of attack protection in which Auth0 blocks suspected bot traffic by enabling a CAPTCHA during the login process." cta="View Glossary" href="/docs/glossary?term=Bot+detection">Bot detection</Tooltip> mitigates scripted attacks by detecting when a request is likely to be coming from a bot. Bot detection includes the number of bots detected over the last seven days.
7979

80-
<Frame>![Screenshot shows a line graph detailing number of bots detected in the last 7 days.](/docs/images/cdy7uua7fh8z/vfXBOFaB8fprq7rbr1vPG/0676832da280a528326b44f97624e8ff/Bot_Detection.png)</Frame>
81-
8280
To learn more about this feature, read [Bot Detection](/docs/secure/attack-protection/bot-detection).
8381

8482
#### Suspicious IP throttling
8583

8684
<Tooltip tip="Suspicious IP Throttling: Form of attack protection that protects your tenant against suspicious logins targeting too many accounts from a single IP address." cta="View Glossary" href="/docs/glossary?term=Suspicious+IP+throttling">Suspicious IP throttling</Tooltip> blocks traffic from any IP address that rapidly attempts too many logins or signups. Suspicious IP throttling includes the number of suspicious IPs blocked over the last seven days.
8785

88-
<Frame>![Screenshot shows a line graph detailing number of suspicious IP activities detected in the last 7 days.](/docs/images/cdy7uua7fh8z/4q2Gso3wAbdAMM9YCUSxTk/23026864247740c4530668a8c4d21665/Suspicious_IP_Throttling.png)</Frame>
89-
9086
To learn more about this feature, read [Suspicious IP Throttling](/docs/secure/attack-protection/suspicious-ip-throttling).
9187

9288
#### Brute-force protection
9389

9490
<Tooltip tip="Brute-force Protection: Form of attack protection that safeguards against brute-force attacks that occur from a single IP address and target a single user account." cta="View Glossary" href="/docs/glossary?term=Brute-force+protection">Brute-force protection</Tooltip> safeguards against a single IP address attacking a single user account. Brute-force protection includes the number of blocked brute-force attempts over the last seven days.
9591

96-
<Frame>![Screenshot shows a line graph detailing number of brute-force attempts blocked in the last 7 days.](/docs/images/cdy7uua7fh8z/2nDIp8GDPe2zhhzcdDPKue/a49e729930a01e21800856768440faab/Brute-Force_Protection.png)</Frame>
97-
9892
To learn more about this feature, read [Brute-Force Protection](/docs/secure/attack-protection/brute-force-protection).
9993

10094
#### Breached password detection
10195

10296
<Tooltip tip="Breached Password Detection: Form of attack protection in which Auth0 notifies your users if they use a username/password combination that has been compromised in a data leak on a third-party website or app." cta="View Glossary" href="/docs/glossary?term=Breached+password+detection">Breached password detection</Tooltip> protects your applications from <Tooltip tip="Breached Password Detection: Form of attack protection in which Auth0 notifies your users if they use a username/password combination that has been compromised in a data leak on a third-party website or app." cta="View Glossary" href="/docs/glossary?term=bad+actors">bad actors</Tooltip> signing up or logging in with stolen credentials. Breached password detection includes the number of breached credentials detected in login and signup flows over the last seven days.
10397

104-
<Frame>![Screenshot shows line graph detailing number of breached credentials detected in the last 7 days. Separate lines are shown for login flows and signup flows.](/docs/images/cdy7uua7fh8z/6DxOEJdBbE6flhk6S0apkx/f0ba51ef05a1717db67aa055299f0d08/Breached_Password_Detection.png)</Frame>
105-
10698
To learn more about this feature, read [Breached Password Detection](/docs/secure/attack-protection/breached-password-detection).
10799

108100
#### Multi-factor authentication
109101

110102
Multi-factor authentication (MFA) verifies users by requiring more than one type of user validation. MFA includes the number of MFA challenges detected and the number of MFA challenges passed or failed over the last seven days.
111103

112-
<Frame>![Screenshot shows two line graphs. One shows the number of MFA challenges in the last 7 days. The other shows the MFA success rate over the last 7 days. Separate lines are shown for MFA passed and MFA failed.](/docs/images/cdy7uua7fh8z/2qqYETiIMP2o0XOciJSS1b/b7b4a61563620aad422a2048e8eb08d4/Multi-Factor_Auth.png)</Frame>
113-
114104
To learn more about this feature, read [Multi-Factor Authentication](/docs/secure/multi-factor-authentication).
115105

116106
## Learn more
117107

118-
* [Metrics](/docs/secure/security-center/metrics)
108+
* [Metrics](/docs/secure/security-center/metrics)

main/docs/secure/security-center/metrics.mdx

Lines changed: 2 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -10,56 +10,14 @@ title: Metrics
1010
that are usually an indicator of known attack types.
1111
'twitter:title': Metrics
1212
---
13-
Security Center uses tenant log events to identify patterns that are usually an indicator of known attack types. We classify tenant log event patterns into categories: normal traffic, credential stuffing threats, signup attack threats, and <Tooltip tip="Multi-factor authentication (MFA): User authentication process that uses a factor in addition to username and password such as a code via SMS." cta="View Glossary" href="/docs/glossary?term=MFA">MFA</Tooltip> bypass threats.
13+
Security Center uses tenant log events to identify patterns that are usually an indicator of known attack types. We classify tenant log event patterns into categories: credential stuffing threats, signup attack threats, and <Tooltip tip="Multi-factor authentication (MFA): User authentication process that uses a factor in addition to username and password such as a code via SMS." cta="View Glossary" href="/docs/glossary?term=MFA">MFA</Tooltip> bypass threats.
1414

1515
<Warning>
1616

1717
Classification of event type codes may change. Avoid implementing solutions dependent on the current log event code definitions.
1818

1919
</Warning>
2020

21-
## Normal traffic
22-
23-
We use normal traffic to establish a benchmark against different threat types we may observe. Normal traffic includes all successful and failed events for a given hour, which includes the following event codes:
24-
25-
<table class="table"><thead>
26-
<tr>
27-
<th>Event code</th>
28-
<th>Event</th>
29-
</tr>
30-
</thead>
31-
<tbody>
32-
<tr>
33-
<td><code>s</code></td>
34-
<td>Successful login</td>
35-
</tr>
36-
<tr>
37-
<td><code>ss</code></td>
38-
<td>Successful signup</td>
39-
</tr>
40-
<tr>
41-
<td><code>sepft</code></td>
42-
<td>Successful exchange of password for access token</td>
43-
</tr>
44-
<tr>
45-
<td><code>f</code></td>
46-
<td>Failed user login</td>
47-
</tr>
48-
<tr>
49-
<td><code>fu</code></td>
50-
<td>Failed user login due to invalid username</td>
51-
</tr>
52-
<tr>
53-
<td><code>fp</code></td>
54-
<td>Failed user login due to invalid password</td>
55-
</tr>
56-
<tr>
57-
<td><code>pwd_leak</code></td>
58-
<td>Attempted login with a leaked password</td>
59-
</tr>
60-
</tbody>
61-
</table>
62-
6321
## Credential stuffing
6422

6523
We identify credential stuffing threats within a single hour with the following event codes:
@@ -172,4 +130,4 @@ We identify MFA bypass threats within a single hour with the following event cod
172130
<td>WebAuthn browser failure</td>
173131
</tr>
174132
</tbody>
175-
</table>
133+
</table>

main/docs/secure/security-center/security-alerts.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,12 @@ title: Configure Security Monitoring Alerts
3838

3939
Thresholds are calculated on a weighted moving average for a given metric and are customizable in your <Tooltip tip="Auth0 Dashboard: Auth0's main product to configure your services." cta="View Glossary" href="/docs/glossary?term=Auth0+Dashboard">Auth0 Dashboard</Tooltip>. Each defined threshold is viewable on your threat monitor metric charts and aggregated on an hourly basis; if no recovery threshold is configured, the recovery default to just below the set warning or alert threshold.
4040

41+
<Warning>
42+
43+
Thresholds apply to the original metric without filters. When filters are applied, the original threshold and filtered trend lines are visible.
44+
45+
</Warning>
46+
4147
<Frame>![A second screenshot of our Security Center Thresholds product](/docs/images/cdy7uua7fh8z/1Kd9d33WUCdlVa1SwEFkKQ/496722ce86bc00cc7f58d1e04e1fd006/MFA_success_rate_threshold_editor_-_english.png)</Frame>
4248

4349
1. Go to [**Security > Security Center > Threat Monitoring**](https://manage.auth0.com/#/security/center/bot-detection) and choose a metric chart.
@@ -57,8 +63,6 @@ Thresholds are calculated on a weighted moving average for a given metric and ar
5763

5864
Thresholds can also be updated or removed in the expand view screen. Different thresholds on the same chart are behind the Threshold label carrot at the top right.
5965

60-
<Frame>![A third screenshot of our Thresholds product ](/docs/images/cdy7uua7fh8z/2E22W6hrzfVAxF0h3H1eR8/cc3afd4e99933f5948461395442bb553/MFA_success_rate_threshold_picker_-_English.png)</Frame>
61-
6266
#### Manage notification destinations
6367

6468
Notification destinations are endpoints to which alert, warning, and recovery notices are delivered. Each tenant is limited to two destination endpoints, and a third-party webhook editor is recommended to personalize the notification's message.

0 commit comments

Comments
 (0)