
Summary
The detection rule 'Spike in Group Lifecycle Change Events' utilizes machine learning to identify unusual spikes in group lifecycle events within Okta, aiming to pinpoint potential privileged access activities. The analysis suggests that adversaries may exploit these spikes to escalate privileges, maintain persistence or facilitate lateral moves in an organization's identity management system. The rule operates on an anomaly threshold of 75, and leverages the recently installed Privileged Access Detection integration. Analysts are encouraged to review details on triggered alerts, suspicious user accounts, and recent access requests to determine legitimacy and correlate with other security alerts. Recommendations for investigations and remediation steps include isolating compromised accounts, reverting unauthorized changes, and enhancing monitoring to prevent privilege escalation.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- User Account
- Cloud Service
- Application Log
ATT&CK Techniques
- T1068
- T1078
Created: 2025-02-18