Possible Okta DoS Attack
Detects possible Denial of Service (DoS) attacks against an Okta organization. An adversary may attempt to disrupt an organization's business operations by performing a DoS attack against its Okta service.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2020/05/21"
3integration = ["okta"]
4maturity = "production"
5updated_date = "2024/09/23"
6
7[rule]
8author = ["Elastic"]
9description = """
10Detects possible Denial of Service (DoS) attacks against an Okta organization. An adversary may attempt to disrupt an
11organization's business operations by performing a DoS attack against its Okta service.
12"""
13index = ["filebeat-*", "logs-okta*"]
14language = "kuery"
15license = "Elastic License v2"
16name = "Possible Okta DoS Attack"
17note = """## Setup
18
19The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
20references = [
21 "https://developer.okta.com/docs/reference/api/system-log/",
22 "https://developer.okta.com/docs/reference/api/event-types/",
23 "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy",
24 "https://www.elastic.co/security-labs/monitoring-okta-threats-with-elastic-security",
25 "https://www.elastic.co/security-labs/starter-guide-to-understanding-okta",
26]
27risk_score = 47
28rule_id = "e6e3ecff-03dd-48ec-acbd-54a04de10c68"
29severity = "medium"
30tags = ["Use Case: Identity and Access Audit", "Data Source: Okta", "Tactic: Impact"]
31timestamp_override = "event.ingested"
32type = "query"
33
34query = '''
35event.dataset:okta.system and event.action:(application.integration.rate_limit_exceeded or system.org.rate_limit.warning or system.org.rate_limit.violation or core.concurrency.org.limit.violation)
36'''
37
38
39[[rule.threat]]
40framework = "MITRE ATT&CK"
41[[rule.threat.technique]]
42id = "T1498"
43name = "Network Denial of Service"
44reference = "https://attack.mitre.org/techniques/T1498/"
45
46[[rule.threat.technique]]
47id = "T1499"
48name = "Endpoint Denial of Service"
49reference = "https://attack.mitre.org/techniques/T1499/"
50
51
52[rule.threat.tactic]
53id = "TA0040"
54name = "Impact"
55reference = "https://attack.mitre.org/tactics/TA0040/"
Setup
The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
References
Related rules
- Attempt to Deactivate an Okta Application
- Attempt to Delete an Okta Application
- Attempt to Modify an Okta Application
- Attempt to Revoke Okta API Token
- Administrator Privileges Assigned to an Okta Group