|
2 | 2 | creation_date = "2020/05/20" |
3 | 3 | integration = ["okta"] |
4 | 4 | maturity = "production" |
5 | | -updated_date = "2025/07/02" |
| 5 | +updated_date = "2025/08/15" |
6 | 6 |
|
7 | 7 | [rule] |
8 | 8 | author = ["Elastic"] |
@@ -33,11 +33,12 @@ This rule fires when an Okta user account has MFA deactivated and no subsequent |
33 | 33 |
|
34 | 34 | #### Possible investigation steps: |
35 | 35 |
|
36 | | -- Identify the actor related to the alert by reviewing `okta.actor.alternate_id` field in the alert. This should give the username of the account being targeted. |
37 | | -- Review `okta.target` or `user.target.full_name` fields to determine if deactivation was performed by a se parate user. |
38 | | -- Using the `okta.actor.alternate_id` field, search for MFA re-activation events where `okta.event_type` is `user.mfa.factor.activate`. |
39 | | -- Review events where `okta.event_type` is `user.authenticate*` to determine if the user account had suspicious login activity. |
| 36 | +- Identify the entity related to the alert by reviewing `okta.target.alternate_id`, `okta.target.id` or `user.target.full_name` fields. This should give the username of the account being targeted. Verify if MFA is deactivated for the target entity. |
| 37 | +- Using the `okta.target.alternate_id` field, search for MFA re-activation events where `okta.event_type` is `user.mfa.factor.activate`. Note if MFA re-activation attempts were made against the target. |
| 38 | +- Identify the actor performing the deactivation by reviewing `okta.actor.alternate_id`, `okta.actor.id` or `user.full_name` fields. This should give the username of the account performing the action. Determine if deactivation was performed by a separate user. |
| 39 | +- Review events where `okta.event_type` is `user.authenticate*` to determine if the actor or target accounts had suspicious login activity. |
40 | 40 | - Geolocation details found in `client.geo*` related fields may be useful in determining if the login activity was suspicious for this user. |
| 41 | +- Examine related administrative activity by the actor for privilege misuse or suspicious changes. |
41 | 42 |
|
42 | 43 | #### False positive steps: |
43 | 44 |
|
@@ -75,7 +76,7 @@ tags = [ |
75 | 76 | type = "eql" |
76 | 77 |
|
77 | 78 | query = ''' |
78 | | -sequence by okta.actor.id with maxspan=12h |
| 79 | +sequence by okta.target.id with maxspan=12h |
79 | 80 | [any where event.dataset == "okta.system" and okta.event_type in ("user.mfa.factor.deactivate", "user.mfa.factor.reset_all") |
80 | 81 | and okta.outcome.reason != "User reset SECURITY_QUESTION factor" and okta.outcome.result == "SUCCESS"] |
81 | 82 | ![any where event.dataset == "okta.system" and okta.event_type == "user.mfa.factor.activate"] |
|
0 commit comments