
Summary
This detection rule identifies when a user accesses the Okta admin application. It is based on querying the Okta logs, specifically filtering for events that signify a session access to the admin app. The logic captures access events from the past two hours up to the current time, ensuring it focuses on recent activities. Additionally, it employs an event_type filter to specifically look for the 'user.session.access_admin_app' event, which corresponds to users accessing the admin section of Okta. This rule can help organizations detect potential unauthorized access or anomalies in user behavior related to administrative functions within their Okta management platform, effectively countering defense evasion tactics by valid accounts. Such detection is crucial for maintaining security and integrity within administrative operations.
Categories
- Identity Management
- Cloud
Data Sources
- Application Log
ATT&CK Techniques
- T1078
Created: 2024-02-09