
Summary
The "Okta Unauthorized Access to Application" detection rule identifies attempts by users to access Okta applications that they have not been assigned to. This rule primarily leverages logs from Okta's Identity Management interface, focusing on instances where access attempts to unassigned applications fail. Such failed attempts can be indicative of potential unauthorized access activities, which pose a risk of data exposure or service disruptions within a network. Monitoring these attempts is crucial for Security Operations Centers (SOCs) as they can escalate into serious issues such as data breaches or violations of compliance regulations. The detection is implemented using a Splunk search that filters user activity and generates alerts based on authentication log data.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- Pod
ATT&CK Techniques
- T1110
- T1087.004
Created: 2025-01-21