
Summary
This rule detects unauthorized attempts to modify Okta applications which could signify attempts by attackers to weaken an organization’s security posture. Modifications, deactivations, or deletions of Okta applications can lead to potential disruptions of business operations and vulnerabilities in security controls. To investigate incidents flagged by this rule, analysts are encouraged to review event logs, confirm users' roles and permissions, assess recent permission changes, and scrutinize the application's history for any unauthorized actions. Besides, the rule addresses the potential for false positives stemming from routine administrative activities or modifications made by third-party vendors. Hence, establishing exceptions might be necessary. If unauthorized changes are confirmed, the application should be isolated, previous settings restored, and extensive monitoring instituted. This detection rule is built on an understanding of Okta’s system events and targets specific application lifecycle updates to enhance organizational security around identity management.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- User Account
- Application Log
- Cloud Service
Created: 2020-11-06