
Summary
This detection rule is crafted to identify when a new administrator role is assigned within the Okta platform. Such actions can indicate potential privilege escalation or persistence actions taken by malicious actors. The rule is set up to monitor events of type 'iam.resourceset.bindings.add', which specifically captures instances of role bindings occurring in the Okta identity management system. By analyzing these events, cybersecurity teams can respond proactively to unauthorized changes in admin roles that could lead to further compromise of organizational resources. The medium severity level suggests that while these events warrant attention, they may not always indicate a high-threat scenario. Care should be taken to differentiate between legitimate administrative actions and potential attacks.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
Created: 2023-01-19