
Summary
The 'Okta IDP Lifecycle Modifications' detection rule identifies critical lifecycle events related to Okta Identity Provider (IDP) configurations, including creation, activation, deactivation, and deletion events. Utilizing OktaIm2 logs ingested via the Splunk Add-on for Okta Identity Cloud, this rule tracks modifications to ensure the security and integrity of authentication processes. Unauthorized changes in these lifecycle events may suggest security breaches, misconfigurations, or attempts by attackers to manipulate authentication mechanisms. The rule aims to enhance the monitoring of IDP lifecycle modifications by collating actionable event data that indicates anomalous behaviors concerning user modifications and IP addresses involved. It emphasizes the importance of assessing the context surrounding modifications to determine legitimate versus malicious activities. Effective implementation necessitates the setup of appropriate log ingestion within Splunk, linking to comprehensive dashboards and alerting systems for proactive security management.
Categories
- Identity Management
- Cloud
- Endpoint
Data Sources
- Cloud Service
- Application Log
- User Account
ATT&CK Techniques
- T1087.004
- T1556
Created: 2025-01-21