Skip to content

Commit afbf124

Browse files
authored
Merge pull request #4485 from DeCohen/WI446819-document-okta-ispms
6 new Okta ISPM articles
2 parents 25857bd + 31ac427 commit afbf124

7 files changed

+176
-1
lines changed
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
title: 'Security assessment: Assign multifactor authentication to Okta privileged user accounts'
3+
description: Microsoft Defender for Identity security posture assessment on Okta. In this assessment, we recommend customers assign multifactor authentication (MFA) to Okta privileged user accounts.
4+
ms.service: microsoft-defender-for-identity
5+
ms.topic: article
6+
# ms.prod: microsoft-defender-for-identity
7+
ms.date: 07/14/2025
8+
ms.reviewer: Himanch
9+
---
10+
11+
# Security assessment: Assign multifactor authentication to Okta privileged user accounts
12+
13+
This report lists any Okta privileged accounts that don't have any multifactor authentication (MFA) methods assigned. 
14+
15+
## Why is a privileged account without MFA a security risk?
16+
17+
All privileged accounts should have multifactor authentication (MFA) enabled to strengthen security. By ensuring that privileged accounts such as Super Admin or Org Admin roles are secured with MFA, organizations can significantly reduce the risk of unauthorized access from compromised credentials. This strategy helps prevent attackers from gaining elevated access, safeguarding sensitive resources and protecting critical administrative functions from abuse.
18+
19+
20+
## Remediation steps
21+
22+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for the "Assign multifactor authentication for Okta privileged user accounts" security assessment.
23+
1. Review the list of exposed entities to discover which of your Okta privileged user accounts don't have any MFA method assigned.
24+
1. Assign and enforce a multifactor authentication (MFA) method to the privileged accounts.
25+
26+
## Next steps
27+
28+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
title: 'Security assessment: Change password for Okta privileged User accounts'
3+
description: Microsoft Defender for Identity security posture assessment on Okta. In this assessment, we recommend customers change the password of Okta privileged user accounts with password last set over 180 days ago.
4+
ms.service: microsoft-defender-for-identity
5+
ms.topic: article
6+
ms.date: 07/14/2025
7+
ms.reviewer: Himanch
8+
---
9+
10+
# Security assessment: Change password for Okta privileged User accounts
11+
12+
This recommendation lists any Okta privileged accounts that use outdated passwords that were last set over 180 days ago.
13+
14+
## Why is a privileged account with an old password a security risk?
15+
16+
Privileged accounts with old passwords create a significant security risk, as older credentials are more likely to be exposed through data breaches or other attack vectors. Enforcing regular password updates for privileged accounts reduces the likelihood of unauthorized access and strengthens overall security. Applying stringent password policies to accounts with elevated privileges protects sensitive resources and lowers the risk of exploitation.
17+
18+
## Remediation steps
19+
20+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for the "Change password for Okta privileged User accounts" security assessment.
21+
1. Review the list of exposed entities to discover which of your Okta privileged user accounts have an old password.
22+
1. Take appropriate action on those accounts by resetting their password.  
23+
24+
## Next steps
25+
26+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
title: 'Security assessment: High number of Okta accounts with privileged role assigned'
3+
description: Microsoft Defender for Identity security posture assessment on Okta. In this assessment, we recommend customers limit the number of Okta accounts with privileged roles assigned to the minimum required for their organization.
4+
ms.service: microsoft-defender-for-identity
5+
ms.topic: article
6+
ms.date: 07/14/2025
7+
ms.reviewer: Himanch
8+
---
9+
10+
# Security assessment: High number of Okta accounts with privileged role assigned
11+
12+
This article describes the security risks associated with having a high number of Okta accounts with privileged roles assigned and provides recommendations for mitigating these risks.
13+
14+
> [!NOTE]
15+
> This report lists Okta accounts with administrator roles - excluding Super Administrator, where the number of accounts assigned to these roles is greater than 25.
16+
17+
## Why is a high number of Okta accounts with privileged roles considered a security risk?
18+
19+
A high number of users with privileged roles increases the risk of misuse or unauthorized access to critical systems. By reducing the number of users assigned to roles such as Super Admin or Org Admin, organizations can better limit access to sensitive resources and reduce the attack surface. Maintaining a smaller, set of privileged accounts ensures more effective governance and minimizes potential security vulnerabilities.
20+
21+
## Remediation steps
22+
23+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for the "High number of Okta accounts with privileged role assigned" security assessment.
24+
1. Review the list of exposed entities to discover which of your Okta accounts have privileged roles assigned.
25+
1. Reduce the number of users assigned to administrator roles (other than Super-Admin) to the minimum necessary to ensure better control and align with least privilege best practices.
26+
27+
## Next steps
28+
29+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
title: 'Security assessment: Highly privileged Okta API token'
3+
description: Microsoft Defender for Identity security posture assessment on Okta. In this assessment, we recommend customers limit the use of highly privileged API tokens.
4+
ms.service: microsoft-defender-for-identity
5+
ms.topic: article
6+
ms.date: 07/14/2025
7+
ms.reviewer: Himanch
8+
---
9+
10+
# Security assessment: Highly privileged Okta API token
11+
12+
This article describes the security risks associated with highly privileged Okta API tokens and provides recommendations for mitigating these risks.
13+
14+
## Why is a highly privileged Okta API token a security risk?
15+
16+
Okta’s API tokens inherit the permissions of the user who creates them. If a user with sensitive permissions generates an API token, it carries those permissions. Any API token created by a Super Admin has the same level of access as the Super Admin account. This can expose sensitive data and functionality to unauthorized users. If the token is stolen, it can grant the attacker access equivalent to the original user.
17+
18+
## Remediation steps
19+
20+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for the "Highly privileged Okta API token" security assessment.
21+
1. Review the list of exposed entities to discover which of your Okta API tokens are highly privileged.
22+
1. If the API token is no longer required, delete it to eliminate unnecessary exposure.
23+
24+
## Next steps
25+
26+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
title: 'Security assessment: Limit the number of Okta Super Admin accounts'
3+
description: Microsoft Defender for Identity security posture assessment on Okta. In this assessment, we recommend customers limit the number of Super Admin accounts to the minimum required for their organization.
4+
ms.service: microsoft-defender-for-identity
5+
ms.topic: article
6+
ms.date: 07/14/2025
7+
ms.reviewer: Himanch
8+
---
9+
10+
# Security assessment: Limit the number of Okta Super Admin accounts
11+
12+
This report lists Okta accounts with Super Administrator role, where the number of users assigned to this role is greater than 5.
13+
14+
## Why is having too many Super Admin accounts a security risk?
15+
16+
A high number of users with privileged roles increases the risk of misuse or unauthorized access to critical systems. By reducing the number of users assigned to roles such as Super Admin or Org Admin, organizations can better limit access to sensitive resources and reduce the attack surface. Maintaining a smaller, set of privileged accounts ensures more effective governance and minimizes potential security vulnerabilities.
17+
18+
## Remediation steps
19+
20+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for the "Limit the number of Okta Super Admin accounts" security assessment.
21+
1. Review the list of exposed entities to discover which of your Okta accounts have Super Admin role assigned.
22+
1. Limit Super Administrator access to the minimum number of users necessary to maintain control over highest level of privileged access.
23+
24+
## Next steps
25+
26+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
title: 'Security assessment: Remove dormant Okta privileged accounts'
3+
description: Microsoft Defender for Identity security posture assessment on Okta. In this assessment, we recommend customers remove dormant Okta privileged user accounts not accessed for over 60 days.
4+
ms.service: microsoft-defender-for-identity
5+
ms.topic: article
6+
ms.date: 07/14/2025
7+
ms.reviewer: Himanch
8+
---
9+
10+
# Security assessment: Remove dormant Okta privileged accounts
11+
12+
This article describes the security risks associated with dormant Okta privileged accounts and provides recommendations for mitigating these risks.
13+
14+
## Why is a dormant privileged account a security risk?
15+
16+
Dormant privileged accounts represent a significant security risk, as they can become targets for unauthorized access or misuse without detection. Deactivating or removing unused privileged accounts ensures that only active, monitored users have access to critical administrative capabilities.
17+
18+
## Remediation steps
19+
20+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for the "Remove dormant Okta privileged accounts" security assessment.
21+
1. Review the list of exposed entities to identify Okta privileged user accounts not used in the last 90 days. This inactivity indicates that the account might be a dormant account or no longer needed.
22+
1. If the account is no longer required, deactivate or remove it to eliminate unnecessary exposure.
23+
24+
## Next steps
25+
26+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)

ATPDocs/toc.yml

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,21 @@ items:
266266
- name: Unsecure account attributes
267267
href: security-assessment-unsecure-account-attributes.md
268268
- name: Weak cipher usage assessment
269-
href: security-assessment-weak-cipher.md
269+
href: security-assessment-weak-cipher.md
270+
- name: Cloud identities
271+
items:
272+
- name: Assign multi-factor authentication to Okta privileged user accounts
273+
href: assign-multi-factor-authentication-okta-privileged-user-accounts.md
274+
- name: Change password for Okta privileged user accounts
275+
href: change-okta-password-privileged-user-accounts.md
276+
- name: High number of Okta accounts with privileged role assigned
277+
href: high-number-of-okta-accounts-with-privileged-role-assigned.md
278+
- name: Highly privileged Okta API token
279+
href: highly-privileged-okta-api-token.md
280+
- name: Limit the number of Okta Super Admin accounts
281+
href: limit-number-okta-super-admin-accounts.md
282+
- name: Remove dormant Okta privileged accounts
283+
href: remove-dormant-okta-privileged-accounts.md
270284
- name: Identity security initiative (Preview)
271285
href: identity-security-initiative.md
272286
- name: Reference

0 commit comments

Comments
 (0)