Okta New Admin Console Behaviours

Detects when Okta identifies new activity in the Admin Console.

Sigma rule (View on GitHub)

 1title: Okta New Admin Console Behaviours
 2id: a0b38b70-3cb5-484b-a4eb-c4d8e7bcc0a9
 3status: experimental
 4description: Detects when Okta identifies new activity in the Admin Console.
 5references:
 6    - https://developer.okta.com/docs/reference/api/system-log/
 7    - https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
 8author: kelnage
 9date: 2023/09/07
10tags:
11    - attack.initial_access
12    - attack.t1078.004
13logsource:
14    product: okta
15    service: okta
16detection:
17    selection:
18        eventtype: 'policy.evaluate_sign_on'
19        target.displayname: 'Okta Admin Console'
20        debugcontext_debugdata_behaviors: 'POSITIVE'
21        debugcontext_debugdata_logonlysecuritydata: 'POSITIVE'
22    condition: selection
23falsepositives:
24    - Whenever an admin starts using new features of the admin console.
25level: low

References

Related rules

to-top