
Summary
This detection rule aims to monitor and flag potential attempts to bypass Okta's multi-factor authentication (MFA) system. MFA provides an added layer of security by requiring multiple forms of verification from users. When an adversary tries to circumvent this security measure, it can indicate an attempt to gain illegitimate access to user accounts and sensitive applications. The rule specifically looks for events related to the action of user MFA bypass attempts (`user.mfa.attempt_bypass`) within Okta logs, which can suggest malicious intent. The response plan involves a thorough investigation, including analyzing the actor's identity, the context of the bypass attempt, and subsequent activities, confirming unauthorized access, and initiating incident response actions. This may include locking accounts, changing passwords, and reviewing system configurations to safeguard against similar attacks.
Categories
- Identity Management
- Cloud
Data Sources
- Pod
- Application Log
- User Account
ATT&CK Techniques
- T1111
Created: 2020-05-21