Okta New Admin Console Behaviours
Detects when Okta identifies new activity in the Admin Console.
Sigma rule (View on GitHub)
1title: Okta New Admin Console Behaviours
2id: a0b38b70-3cb5-484b-a4eb-c4d8e7bcc0a9
3status: test
4description: Detects when Okta identifies new activity in the Admin Console.
5references:
6 - https://developer.okta.com/docs/reference/api/system-log/
7 - https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
8author: kelnage
9date: 2023-09-07
10modified: 2024-06-26
11tags:
12 - attack.privilege-escalation
13 - attack.persistence
14 - attack.defense-evasion
15 - attack.initial-access
16 - attack.t1078.004
17logsource:
18 product: okta
19 service: okta
20detection:
21 selection_event:
22 eventtype: 'policy.evaluate_sign_on'
23 target.displayname: 'Okta Admin Console'
24 selection_positive:
25 - debugcontext.debugdata.behaviors|contains: 'POSITIVE'
26 - debugcontext.debugdata.logonlysecuritydata|contains: 'POSITIVE'
27 condition: all of selection_*
28falsepositives:
29 - When an admin begins using the Admin Console and one of Okta's heuristics incorrectly identifies the behavior as being unusual.
30level: high
References
Related rules
- AWS IAM S3Browser LoginProfile Creation
- AWS IAM S3Browser Templated S3 Bucket Policy Creation
- AWS IAM S3Browser User or AccessKey Creation
- AWS Root Credentials
- AWS SAML Provider Deletion Activity