
Summary
The rule detects modifications or creations of third-party identity providers (IdPs) within an Okta environment. It addresses a critical security concern where attackers may set up a second IdP to impersonate legitimate users, allowing them to gain unauthorized access to applications within the compromised organization. This detection is crucial for monitoring suspicious IdP changes that could indicate an attempt at credential theft or organizational impersonation. The rule leverages logs related to the lifecycle management of IdPs and includes thresholds to ensure legitimate changes by trusted administrators do not trigger alerts, while still capturing potential malicious activities.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- Logon Session
- Application Log
- User Account
ATT&CK Techniques
- T1556
- T1199
- T1098
Created: 2024-03-19