By Ashish Shah
The recent attack on Salesloft and its impact on hundreds of Salesforce instances highlights a critical vulnerability in modern enterprise environments. The incident did not involve a direct breach of Salesforce, but rather the compromise of a Non-Human Identity (NHI)—specifically, an OAuth token belonging to the Salesloft connected app. An attacker compromised the token and used it to exfiltrate data from Salesforce.
Below we outline how Andromeda thinks about a compromise like this and the steps that can be taken to detect anomalous identity activity and thwart a breach.
Andromeda's approach is centered on understanding and baselining the behavior of every identity, both human and non-human. We inventory all identities, rightsize permissions, and tie every NHI to a human owner. Upon deployment, Andromeda creates a dynamic risk profile for each NHI by learning its normal activity patterns, including:
Using this context, Andromeda can immediately identify deviations from the established baseline. In a case similar to the Salesloft breach, Andromeda would detect two key anomalies:
Using the Salesloft breach as an example:
Andromeda would instantly flag this activity. Recognizing that the NHI owner (in this example: the enterprise user who owns the Salesloft NHI) was not the compromised entity, Andromeda would take the following automated actions:
By focusing on behavioral anomalies rather than relying on static security measures, Andromeda provides robust, proactive identity security to ensure that compromised credentials are detected, alerted, and revoked so they will not result in a breach.
If you would like to learn more, please reach out for a demonstration.
By Ashish Shah
The recent attack on Salesloft and its impact on hundreds of Salesforce instances highlights a critical vulnerability in modern enterprise environments. The incident did not involve a direct breach of Salesforce, but rather the compromise of a Non-Human Identity (NHI)—specifically, an OAuth token belonging to the Salesloft connected app. An attacker compromised the token and used it to exfiltrate data from Salesforce.
Below we outline how Andromeda thinks about a compromise like this and the steps that can be taken to detect anomalous identity activity and thwart a breach.
Andromeda's approach is centered on understanding and baselining the behavior of every identity, both human and non-human. We inventory all identities, rightsize permissions, and tie every NHI to a human owner. Upon deployment, Andromeda creates a dynamic risk profile for each NHI by learning its normal activity patterns, including:
Using this context, Andromeda can immediately identify deviations from the established baseline. In a case similar to the Salesloft breach, Andromeda would detect two key anomalies:
Using the Salesloft breach as an example:
Andromeda would instantly flag this activity. Recognizing that the NHI owner (in this example: the enterprise user who owns the Salesloft NHI) was not the compromised entity, Andromeda would take the following automated actions:
By focusing on behavioral anomalies rather than relying on static security measures, Andromeda provides robust, proactive identity security to ensure that compromised credentials are detected, alerted, and revoked so they will not result in a breach.
If you would like to learn more, please reach out for a demonstration.