heroui logo

Okta Policy Modified or Deleted

Sigma Rules

View Source
Summary
This detection rule is designed to monitor for any modifications or deletions of Okta policies, which can indicate potentially malicious or unauthorized actions within an organization's identity management environment. The rule leverages Okta's system log API to identify specific event types related to policy lifecycle events. When an Okta policy is either updated or deleted, this can have significant implications for the security posture of an organization, especially if such changes are made by unauthorized users. The detection mechanism is straightforward; it triggers on the defined event types indicative of policy changes. Given the low impact level and the nature of Okta's configuration management, it's crucial for organizations to investigate any detected changes that are inconsistent with known administrative behaviors. To enhance accuracy, the detection rule includes guidance on handling potential false positives, primarily stemming from legitimate activities by administrators. Users of this rule are encouraged to regularly confirm that changes align with expected administrative practices and to monitor any unfamiliar behaviors closely for potential security risks.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Cloud Service
Created: 2021-09-12