Okta Identity Provider Created
Detects when a new identity provider is created for Okta.
Sigma rule (View on GitHub)
1title: Okta Identity Provider Created
2id: 969c7590-8c19-4797-8c1b-23155de6e7ac
3status: test
4description: Detects when a new identity provider is created for Okta.
5references:
6 - https://developer.okta.com/docs/reference/api/system-log/
7 - https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
8author: kelnage
9date: 2023-09-07
10tags:
11 - attack.privilege-escalation
12 - attack.persistence
13 - attack.t1098.001
14logsource:
15 product: okta
16 service: okta
17detection:
18 selection:
19 eventtype: 'system.idp.lifecycle.create'
20 condition: selection
21falsepositives:
22 - When an admin creates a new, authorised identity provider.
23level: medium
References
Related rules
- Added Credentials to Existing Application
- Github Outside Collaborator Detected
- A Member Was Added to a Security-Enabled Global Group
- A Member Was Removed From a Security-Enabled Global Group
- A New Trust Was Created To A Domain