A comprehensive framework for detecting identity compromise, token misuse, federation manipulation, and privilege escalation across cloud and SaaS environments.
What This Module Provides
Identity Compromise Detection
Identify credential theft, account takeover, and unauthorized access patterns across identity providers and authentication systems.
Token & Federation Abuse
Detect token misuse, SAML manipulation, OIDC exploitation, and session hijacking techniques used by sophisticated threat actors.
Cloud & SaaS Threats
Monitor privilege escalation, persistence mechanisms, lateral movement, and cross-cloud pivoting in modern environments.
ITDLL unifies detection signals across identity providers, cloud services, and authentication mechanisms into actionable, Gamma-friendly detection logic. Each signal maps to attacker behavior profiles and the Identity Attack Chain for comprehensive threat coverage.
Detection Logic Structure
Each category page delivers comprehensive detection intelligence designed for immediate implementation by security teams.
Detection Signals & Logic Sequences
Pre-built detection patterns with correlated event sequences, thresholds, and trigger conditions optimized for identity-based threats.
Attacker Behavior Profiles
TTPs mapped to real-world threat actor techniques, enabling proactive hunting and incident response across identity attack surfaces.
Identity Attack Chain Mapping
Direct alignment to IAC stages—from credential acquisition through persistence—ensuring comprehensive detection coverage.
Misconfiguration Dependencies
Critical context on weak MFA, overprivileged principals, federation gaps, and session misgovernance that enable attacks.
Threat Actor Alignment
Detection signals correlated with known APT groups and cybercriminal tactics specific to identity exploitation campaigns.
Recommended Detections
Prioritized detection rules with SIEM/XDR query examples, tuning guidance, and false positive reduction strategies.
Detection Logic Categories
Three consolidated categories covering behavioral anomalies, token abuse, and cloud correlation logic for comprehensive identity threat detection.
Category A: Behavioral & Outlier Signals
Behavioral deviations including impossible travel, anomalous access patterns, role misuse, velocity attacks, and user behavior analytics. Detects credential stuffing, password sprays, and account enumeration.
Cloud identity misuse, service principal abuse, cross-tenant pivoting, API key compromise, and multi-signal correlation logic. Detects privilege escalation and persistence across AWS, Azure, GCP, and SaaS platforms.