
Summary
The detection rule identifies unauthorized access attempts to Okta applications by monitoring specific system events. It utilizes event datasets and actions that indicate unauthorized access, such as 'app.generic.unauth_app_access_attempt'. When these events are logged, it suggests that an adversary might be using valid credentials to attempt unauthorized access, thereby circumventing security controls. Key investigation steps include reviewing event logs, identifying user accounts associated with unauthorized attempts, examining source IPs for suspicious activity, and checking for anomalies related to user permissions or roles. The rule supports threat mitigation through comprehensive analysis and strong incident response protocols, encouraging the implementation of measures like multi-factor authentication (MFA) for affected accounts. Overall, the rule aids early detection and response to potential breaches within Okta-managed applications.
Categories
- Identity Management
- Cloud
- Web
- Infrastructure
Data Sources
- User Account
- Application Log
- Logon Session
ATT&CK Techniques
- T1078
Created: 2021-05-14