
Summary
The rule identifies successful single-factor authentication attempts on Okta accounts that have not enabled Multi-Factor Authentication (MFA). It analyzes logs from the Okta platform, specifically looking for authentication events where the "Okta Verify" method was not used. This type of authentication can indicate possible misconfigurations or policy violations that could leave accounts vulnerable to unauthorized access. If an account without MFA is accessed using only a single factor, it presents a significant security risk, as it may lead to account takeover and potential data breaches. Security professionals should closely monitor such events to determine if they signify a malicious attempt to compromise user accounts or if they are merely legitimate logins from exempted users.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- Pod
- Cloud Service
- User Account
ATT&CK Techniques
- T1078
- T1586
- T1586.003
- T1078.004
- T1621
Created: 2025-01-21