
Summary
The rule 'Potential Okta Password in AlternateID Field' is designed to detect instances where a user may have inadvertently entered their password into the username field of an Okta login attempt. This scenario poses a significant security risk, as the password could be logged in plaintext within system logs, making it accessible to unauthorized users or potential attackers. The rule identifies such occurrences by analyzing Okta's system log events, specifically filtering for failed login attempts (core.user_auth.login_failed) and checking if the alternate ID field contains patterns resembling a password format, such as the Okta-specific user identifier or commonly used email formats. If a match is found where the alternate ID matches the criteria but the login fails, the rule triggers an alert. The goal of this rule is to enhance security monitoring around user authentication mechanisms and ensure that sensitive information like user passwords are not inadvertently exposed in logs.
Categories
- Cloud
- Identity Management
- Application
Data Sources
- User Account
- Application Log
Created: 2023-04-03