Modification or Removal of an Okta Application Sign-On Policy

Detects attempts to modify or delete a sign on policy for an Okta application. An adversary may attempt to modify or delete the sign on policy for an Okta application in order to remove or weaken an organization's security controls.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2020/07/01"
 3integration = ["okta"]
 4maturity = "production"
 5updated_date = "2025/01/15"
 6min_stack_version = "8.15.0"
 7min_stack_comments = "Breaking change at 8.15.0 for the Okta Integration."
 8
 9[rule]
10author = ["Elastic"]
11description = """
12Detects attempts to modify or delete a sign on policy for an Okta application. An adversary may attempt to modify or
13delete the sign on policy for an Okta application in order to remove or weaken an organization's security controls.
14"""
15false_positives = [
16    """
17    Consider adding exceptions to this rule to filter false positives if sign on policies for Okta applications are
18    regularly modified or deleted in your organization.
19    """,
20]
21index = ["filebeat-*", "logs-okta*"]
22language = "kuery"
23license = "Elastic License v2"
24name = "Modification or Removal of an Okta Application Sign-On Policy"
25note = """## Triage and analysis
26
27> **Disclaimer**:
28> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
29
30### Investigating Modification or Removal of an Okta Application Sign-On Policy
31
32Okta's sign-on policies are crucial for enforcing authentication controls within an organization. Adversaries may target these policies to weaken security by modifying or removing them, thus bypassing authentication measures. The detection rule monitors system events for updates or deletions of sign-on policies, flagging potential unauthorized changes to maintain security integrity.
33
34### Possible investigation steps
35
36- Review the event logs for entries with the dataset field set to okta.system to confirm the source of the alert.
37- Examine the event.action field for values application.policy.sign_on.update or application.policy.sign_on.rule.delete to identify the specific action taken.
38- Identify the user or system account associated with the event to determine if the action was performed by an authorized individual.
39- Check the timestamp of the event to correlate with any other suspicious activities or changes in the system around the same time.
40- Investigate the history of changes to the affected sign-on policy to understand the context and frequency of modifications or deletions.
41- Assess the impact of the policy change on the organization's security posture and determine if any immediate remediation is necessary.
42- If unauthorized activity is suspected, initiate a security incident response to contain and mitigate potential threats.
43
44### False positive analysis
45
46- Routine administrative updates to sign-on policies by authorized personnel can trigger alerts. To manage this, establish a list of trusted users or roles and create exceptions for their actions.
47- Scheduled maintenance or policy reviews may involve legitimate modifications or deletions. Document these activities and adjust the detection rule to exclude events during known maintenance windows.
48- Automated scripts or tools used for policy management might cause false positives. Identify these tools and configure the rule to recognize and exclude their expected actions.
49- Changes due to integration with third-party applications can be mistaken for unauthorized modifications. Verify these integrations and whitelist their associated actions to prevent unnecessary alerts.
50
51### Response and remediation
52
53- Immediately isolate the affected Okta application to prevent further unauthorized access or changes. This can be done by disabling the application temporarily until the issue is resolved.
54- Review the audit logs to identify the source of the modification or deletion attempt, focusing on the user account and IP address associated with the event.
55- Revert any unauthorized changes to the sign-on policy by restoring it to the last known good configuration. Ensure that all security controls are reinstated.
56- Conduct a thorough review of user accounts with administrative privileges in Okta to ensure they are legitimate and have not been compromised. Reset passwords and enforce multi-factor authentication (MFA) for these accounts.
57- Notify the security team and relevant stakeholders about the incident, providing details of the attempted policy modification or deletion and the steps taken to contain the threat.
58- Escalate the incident to higher-level security management if the source of the threat is internal or if there is evidence of a broader compromise.
59- Implement additional monitoring and alerting for any future attempts to modify or delete sign-on policies, ensuring that similar threats are detected and addressed promptly.
60
61## Setup
62
63The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
64references = [
65    "https://help.okta.com/en/prod/Content/Topics/Security/App_Based_Signon.htm",
66    "https://developer.okta.com/docs/reference/api/system-log/",
67    "https://developer.okta.com/docs/reference/api/event-types/",
68    "https://www.elastic.co/security-labs/testing-okta-visibility-and-detection-dorothy",
69    "https://www.elastic.co/security-labs/monitoring-okta-threats-with-elastic-security",
70    "https://www.elastic.co/security-labs/starter-guide-to-understanding-okta",
71]
72risk_score = 47
73rule_id = "cd16fb10-0261-46e8-9932-a0336278cdbe"
74severity = "medium"
75tags = ["Tactic: Persistence", "Use Case: Identity and Access Audit", "Data Source: Okta", "Resources: Investigation Guide"]
76timestamp_override = "event.ingested"
77type = "query"
78
79query = '''
80event.dataset:okta.system and event.action:(application.policy.sign_on.update or application.policy.sign_on.rule.delete)
81'''
82
83
84[[rule.threat]]
85framework = "MITRE ATT&CK"
86[[rule.threat.technique]]
87id = "T1556"
88name = "Modify Authentication Process"
89reference = "https://attack.mitre.org/techniques/T1556/"
90
91
92[rule.threat.tactic]
93id = "TA0003"
94name = "Persistence"
95reference = "https://attack.mitre.org/tactics/TA0003/"

Triage and analysis

Disclaimer: This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.

Investigating Modification or Removal of an Okta Application Sign-On Policy

Okta's sign-on policies are crucial for enforcing authentication controls within an organization. Adversaries may target these policies to weaken security by modifying or removing them, thus bypassing authentication measures. The detection rule monitors system events for updates or deletions of sign-on policies, flagging potential unauthorized changes to maintain security integrity.

Possible investigation steps

  • Review the event logs for entries with the dataset field set to okta.system to confirm the source of the alert.
  • Examine the event.action field for values application.policy.sign_on.update or application.policy.sign_on.rule.delete to identify the specific action taken.
  • Identify the user or system account associated with the event to determine if the action was performed by an authorized individual.
  • Check the timestamp of the event to correlate with any other suspicious activities or changes in the system around the same time.
  • Investigate the history of changes to the affected sign-on policy to understand the context and frequency of modifications or deletions.
  • Assess the impact of the policy change on the organization's security posture and determine if any immediate remediation is necessary.
  • If unauthorized activity is suspected, initiate a security incident response to contain and mitigate potential threats.

False positive analysis

  • Routine administrative updates to sign-on policies by authorized personnel can trigger alerts. To manage this, establish a list of trusted users or roles and create exceptions for their actions.
  • Scheduled maintenance or policy reviews may involve legitimate modifications or deletions. Document these activities and adjust the detection rule to exclude events during known maintenance windows.
  • Automated scripts or tools used for policy management might cause false positives. Identify these tools and configure the rule to recognize and exclude their expected actions.
  • Changes due to integration with third-party applications can be mistaken for unauthorized modifications. Verify these integrations and whitelist their associated actions to prevent unnecessary alerts.

Response and remediation

  • Immediately isolate the affected Okta application to prevent further unauthorized access or changes. This can be done by disabling the application temporarily until the issue is resolved.
  • Review the audit logs to identify the source of the modification or deletion attempt, focusing on the user account and IP address associated with the event.
  • Revert any unauthorized changes to the sign-on policy by restoring it to the last known good configuration. Ensure that all security controls are reinstated.
  • Conduct a thorough review of user accounts with administrative privileges in Okta to ensure they are legitimate and have not been compromised. Reset passwords and enforce multi-factor authentication (MFA) for these accounts.
  • Notify the security team and relevant stakeholders about the incident, providing details of the attempted policy modification or deletion and the steps taken to contain the threat.
  • Escalate the incident to higher-level security management if the source of the threat is internal or if there is evidence of a broader compromise.
  • Implement additional monitoring and alerting for any future attempts to modify or delete sign-on policies, ensuring that similar threats are detected and addressed promptly.

Setup

The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

References

Related rules

to-top