
Summary
This detection rule identifies instances where a new device is enrolled on an Okta account, utilizing OktaIm2 logs that are processed through the Splunk Add-on for Okta Identity Cloud. Such events are crucial to monitor because they can signify legitimate administrative activity or a potential security breach where an attacker adds a device to maintain unauthorized access to an account. This behavior could lead to serious consequences like account takeover and ongoing unauthorized control over the Okta account. The rule incorporates a specific search query to pinpoint newly created device enrollments and emphasizes the importance of validating these events to distinguish between legitimate user actions and possible malicious activity.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- Pod
- User Account
- Cloud Service
- Logon Session
ATT&CK Techniques
- T1098
- T1098.005
Created: 2025-01-21