
Summary
The detection rule identifies unusual spikes in Okta group membership events using a machine learning model, indicating potential unauthorized privileged access activity. Such anomalies could suggest that attackers or insider threats are attempting to escalate their privileges by adding accounts to sensitive groups. This rule operates by analyzing group membership events over a specified timeframe and raises alerts when the anomalies exceed a defined threshold. To implement this rule, users must configure the Privileged Access Detection integration and collect Okta logs, ensuring compliance with the prerequisites outlined in the setup instructions.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1068
- T1078
Created: 2025-02-18