heroui logo

Okta Multiple Accounts Locked Out

Splunk Security Content

View Source
Summary
The detection rule identifies instances of multiple Okta account lockouts occurring within a five-minute interval, which are indicative of potential brute force or password spraying attacks. It aggregates the user.account.lock event data from Okta logs and flags situations where more than five lockout events have been recorded in this timeframe. This raises concerns for unauthorized access attempts that can lead to account takeovers or exposure of sensitive information. The search utilizes Splunk's data model framework for effective event aggregation and monitoring, providing security teams with actionable insights to mitigate risks associated with account management and protect organizational assets in the Okta environment.
Categories
  • Identity Management
  • Cloud
Data Sources
  • Pod
  • User Account
  • Cloud Service
ATT&CK Techniques
  • T1110
Created: 2025-01-21