Okta New Admin Console Behaviours

Detects when Okta identifies new activity in the Admin Console.

Sigma rule (View on GitHub)

 1title: Okta New Admin Console Behaviours
 2id: a0b38b70-3cb5-484b-a4eb-c4d8e7bcc0a9
 3status: test
 4description: Detects when Okta identifies new activity in the Admin Console.
 5references:
 6    - https://developer.okta.com/docs/reference/api/system-log/
 7    - https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
 8author: kelnage
 9date: 2023-09-07
10modified: 2024-06-26
11tags:
12    - attack.privilege-escalation
13    - attack.persistence
14    - attack.defense-evasion
15    - attack.initial-access
16    - attack.t1078.004
17logsource:
18    product: okta
19    service: okta
20detection:
21    selection_event:
22        eventtype: 'policy.evaluate_sign_on'
23        target.displayname: 'Okta Admin Console'
24    selection_positive:
25        - debugcontext.debugdata.behaviors|contains: 'POSITIVE'
26        - debugcontext.debugdata.logonlysecuritydata|contains: 'POSITIVE'
27    condition: all of selection_*
28falsepositives:
29    - When an admin begins using the Admin Console and one of Okta's heuristics incorrectly identifies the behavior as being unusual.
30level: high

References

Related rules

to-top