
Summary
The detection rule identifies sign-in attempts to Okta from anonymizing VPN services, which can indicate potential account compromise by threat actors utilizing such services to obscure their identity. The rule specifies the monitoring of Okta system logs, looking for events that are flagged as originating from known VPN anonymizers or proxies. With a defined severity of Medium, the rule aims to recognize questionable access and supports IT security teams in taking preventive actions against unauthorized access attempts. This may help in safeguarding users who potentially have their credentials compromised and ensures that only sign-ins from trusted network zones are allowed. Automated responses or user alerts could be established based on the detection of such anomalous events.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1556
Created: 2023-10-19