
Summary
This rule detects anomalous login behavior for Okta users by identifying instances where a user logs in from multiple cities within a 24-hour window. The detection is based on Okta Identity Management logs, specifically analyzing login events to assess their geographic locations. This behavior is potentially indicative of account compromise, suggesting that an attacker may be attempting unauthorized access to the user’s account from various locations. If such behavior is confirmed to be malicious, it could lead to serious security breaches, including account takeovers or unauthorized access to sensitive data. The logic behind the detection uses geolocation data derived from IP addresses associated with the logins, ensuring that appropriate alerts are generated whenever suspicious activity is detected. To implement this detection, organizations need to ensure that they are ingesting Okta logs into their security information and event management (SIEM) systems via the necessary connectors, such as the Splunk Add-on for Okta Identity Cloud. Proper verification of alerts, along with the capability to drill down into detailed analyses of logged events, is critical for effective incident response and risk mitigation.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- Pod
ATT&CK Techniques
- T1110
- T1586.003
Created: 2025-01-21