Possible Okta DoS Attack

Detects possible Denial of Service (DoS) attacks against an Okta organization. An adversary may attempt to disrupt an organization's business operations by performing a DoS attack against its Okta service.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2020/05/21"
 3integration = ["okta"]
 4maturity = "production"
 5updated_date = "2024/09/23"
 6
 7[rule]
 8author = ["Elastic"]
 9description = """
10Detects possible Denial of Service (DoS) attacks against an Okta organization. An adversary may attempt to disrupt an
11organization's business operations by performing a DoS attack against its Okta service.
12"""
13index = ["filebeat-*", "logs-okta*"]
14language = "kuery"
15license = "Elastic License v2"
16name = "Possible Okta DoS Attack"
17note = """## Setup
18
19The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
20references = [
21    "https://developer.okta.com/docs/reference/api/system-log/",
22    "https://developer.okta.com/docs/reference/api/event-types/",
23    "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy",
24    "https://www.elastic.co/security-labs/monitoring-okta-threats-with-elastic-security",
25    "https://www.elastic.co/security-labs/starter-guide-to-understanding-okta",
26]
27risk_score = 47
28rule_id = "e6e3ecff-03dd-48ec-acbd-54a04de10c68"
29severity = "medium"
30tags = ["Use Case: Identity and Access Audit", "Data Source: Okta", "Tactic: Impact"]
31timestamp_override = "event.ingested"
32type = "query"
33
34query = '''
35event.dataset:okta.system and event.action:(application.integration.rate_limit_exceeded or system.org.rate_limit.warning or system.org.rate_limit.violation or core.concurrency.org.limit.violation)
36'''
37
38
39[[rule.threat]]
40framework = "MITRE ATT&CK"
41[[rule.threat.technique]]
42id = "T1498"
43name = "Network Denial of Service"
44reference = "https://attack.mitre.org/techniques/T1498/"
45
46[[rule.threat.technique]]
47id = "T1499"
48name = "Endpoint Denial of Service"
49reference = "https://attack.mitre.org/techniques/T1499/"
50
51
52[rule.threat.tactic]
53id = "TA0040"
54name = "Impact"
55reference = "https://attack.mitre.org/tactics/TA0040/"

Setup

The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

References

Related rules

to-top