Possible Okta DoS Attack

Detects possible Denial of Service (DoS) attacks against an Okta organization. An adversary may attempt to disrupt an organization's business operations by performing a DoS attack against its Okta service.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2020/05/21"
 3integration = ["okta"]
 4maturity = "production"
 5updated_date = "2024/12/09"
 6min_stack_version = "8.15.0"
 7min_stack_comments = "Breaking change at 8.15.0 for the Okta Integration."
 8
 9[rule]
10author = ["Elastic"]
11description = """
12Detects possible Denial of Service (DoS) attacks against an Okta organization. An adversary may attempt to disrupt an
13organization's business operations by performing a DoS attack against its Okta service.
14"""
15index = ["filebeat-*", "logs-okta*"]
16language = "kuery"
17license = "Elastic License v2"
18name = "Possible Okta DoS Attack"
19note = """## Setup
20
21The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
22references = [
23    "https://developer.okta.com/docs/reference/api/system-log/",
24    "https://developer.okta.com/docs/reference/api/event-types/",
25    "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy",
26    "https://www.elastic.co/security-labs/monitoring-okta-threats-with-elastic-security",
27    "https://www.elastic.co/security-labs/starter-guide-to-understanding-okta",
28]
29risk_score = 47
30rule_id = "e6e3ecff-03dd-48ec-acbd-54a04de10c68"
31severity = "medium"
32tags = ["Use Case: Identity and Access Audit", "Data Source: Okta", "Tactic: Impact"]
33timestamp_override = "event.ingested"
34type = "query"
35
36query = '''
37event.dataset:okta.system and event.action:(application.integration.rate_limit_exceeded or system.org.rate_limit.warning or system.org.rate_limit.violation or core.concurrency.org.limit.violation)
38'''
39
40
41[[rule.threat]]
42framework = "MITRE ATT&CK"
43[[rule.threat.technique]]
44id = "T1498"
45name = "Network Denial of Service"
46reference = "https://attack.mitre.org/techniques/T1498/"
47
48[[rule.threat.technique]]
49id = "T1499"
50name = "Endpoint Denial of Service"
51reference = "https://attack.mitre.org/techniques/T1499/"
52
53
54[rule.threat.tactic]
55id = "TA0040"
56name = "Impact"
57reference = "https://attack.mitre.org/tactics/TA0040/"

Setup

The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

References

Related rules

to-top