Attempt to Modify an Okta Policy
Detects attempts to modify an Okta policy. An adversary may attempt to modify an Okta policy in order to weaken an organization's security controls. For example, an adversary may attempt to modify an Okta multi-factor authentication (MFA) policy in order to weaken the authentication requirements for user accounts.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2020/05/21"
3integration = ["okta"]
4maturity = "production"
5updated_date = "2024/09/23"
6
7[rule]
8author = ["Elastic"]
9description = """
10Detects attempts to modify an Okta policy. An adversary may attempt to modify an Okta policy in order to weaken an
11organization's security controls. For example, an adversary may attempt to modify an Okta multi-factor authentication
12(MFA) policy in order to weaken the authentication requirements for user accounts.
13"""
14false_positives = [
15 """
16 Consider adding exceptions to this rule to filter false positives if Okta policies are regularly modified in your
17 organization.
18 """,
19]
20index = ["filebeat-*", "logs-okta*"]
21language = "kuery"
22license = "Elastic License v2"
23name = "Attempt to Modify an Okta Policy"
24note = """## Triage and analysis
25
26### Investigating Attempt to Modify an Okta Policy
27
28Modifications to Okta policies may indicate attempts to weaken an organization's security controls. If such an attempt is detected, consider the following steps for investigation.
29
30#### Possible investigation steps:
31- Identify the actor associated with the event. Check the fields `okta.actor.id`, `okta.actor.type`, `okta.actor.alternate_id`, and `okta.actor.display_name`.
32- Determine the client used by the actor. You can look at `okta.client.device`, `okta.client.ip`, `okta.client.user_agent.raw_user_agent`, `okta.client.ip_chain.ip`, and `okta.client.geographical_context`.
33- Check the nature of the policy modification. You can review the `okta.target` field, especially `okta.target.display_name` and `okta.target.id`.
34- Examine the `okta.outcome.result` and `okta.outcome.reason` fields to understand the outcome of the modification attempt.
35- Check if there have been other similar modification attempts in a short time span from the same actor or IP address.
36
37### False positive analysis:
38- This alert might be a false positive if Okta policies are regularly updated in your organization as a part of normal operations.
39- Check if the actor associated with the event has legitimate rights to modify the Okta policies.
40- Verify the actor's geographical location and the time of the modification attempt. If these align with the actor's regular behavior, it could be a false positive.
41
42### Response and remediation:
43- If unauthorized modification is confirmed, initiate the incident response process.
44- Lock the actor's account and enforce password change as an immediate response.
45- Reset MFA tokens for the actor and enforce re-enrollment, if applicable.
46- Review any other actions taken by the actor to assess the overall impact.
47- If the attack was facilitated by a particular technique, ensure your systems are patched or configured to prevent such techniques.
48- Consider a security review of your Okta policies and rules to ensure they follow security best practices.
49
50## Setup
51
52The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
53references = [
54 "https://developer.okta.com/docs/reference/api/system-log/",
55 "https://developer.okta.com/docs/reference/api/event-types/",
56 "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy",
57 "https://www.elastic.co/security-labs/monitoring-okta-threats-with-elastic-security",
58 "https://www.elastic.co/security-labs/starter-guide-to-understanding-okta",
59]
60risk_score = 21
61rule_id = "6731fbf2-8f28-49ed-9ab9-9a918ceb5a45"
62severity = "low"
63tags = ["Use Case: Identity and Access Audit", "Data Source: Okta", "Tactic: Defense Evasion"]
64timestamp_override = "event.ingested"
65type = "query"
66
67query = '''
68event.dataset:okta.system and event.action:policy.lifecycle.update
69'''
70
71
72[[rule.threat]]
73framework = "MITRE ATT&CK"
74[[rule.threat.technique]]
75id = "T1562"
76name = "Impair Defenses"
77reference = "https://attack.mitre.org/techniques/T1562/"
78[[rule.threat.technique.subtechnique]]
79id = "T1562.007"
80name = "Disable or Modify Cloud Firewall"
81reference = "https://attack.mitre.org/techniques/T1562/007/"
82
83
84
85[rule.threat.tactic]
86id = "TA0005"
87name = "Defense Evasion"
88reference = "https://attack.mitre.org/tactics/TA0005/"
Triage and analysis
Investigating Attempt to Modify an Okta Policy
Modifications to Okta policies may indicate attempts to weaken an organization's security controls. If such an attempt is detected, consider the following steps for investigation.
Possible investigation steps:
- Identify the actor associated with the event. Check the fields
okta.actor.id
,okta.actor.type
,okta.actor.alternate_id
, andokta.actor.display_name
. - Determine the client used by the actor. You can look at
okta.client.device
,okta.client.ip
,okta.client.user_agent.raw_user_agent
,okta.client.ip_chain.ip
, andokta.client.geographical_context
. - Check the nature of the policy modification. You can review the
okta.target
field, especiallyokta.target.display_name
andokta.target.id
. - Examine the
okta.outcome.result
andokta.outcome.reason
fields to understand the outcome of the modification attempt. - Check if there have been other similar modification attempts in a short time span from the same actor or IP address.
False positive analysis:
- This alert might be a false positive if Okta policies are regularly updated in your organization as a part of normal operations.
- Check if the actor associated with the event has legitimate rights to modify the Okta policies.
- Verify the actor's geographical location and the time of the modification attempt. If these align with the actor's regular behavior, it could be a false positive.
Response and remediation:
- If unauthorized modification is confirmed, initiate the incident response process.
- Lock the actor's account and enforce password change as an immediate response.
- Reset MFA tokens for the actor and enforce re-enrollment, if applicable.
- Review any other actions taken by the actor to assess the overall impact.
- If the attack was facilitated by a particular technique, ensure your systems are patched or configured to prevent such techniques.
- Consider a security review of your Okta policies and rules to ensure they follow security best practices.
Setup
The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
References
Related rules
- Attempt to Deactivate an Okta Network Zone
- Attempt to Deactivate an Okta Policy
- Attempt to Deactivate an Okta Policy Rule
- Attempt to Delete an Okta Network Zone
- Attempt to Delete an Okta Policy