Okta Application Modified or Deleted
Detects when an Okta application is modified or deleted, potentially indicating unauthorized changes or removal of critical applications.
This alert detects modifications or deletions of applications within the Okta identity and access management platform. While the specific actor is unknown, the modification or deletion of an application can lead to significant disruptions and potential security breaches. The activity is detected through Okta system logs that record application lifecycle events. This is crucial for defenders because unauthorized changes to applications can lead to privilege escalation, data breaches, or denial of service. Monitoring these events allows for prompt investigation and mitigation of potentially malicious activity.
Attack Chain
- Attacker gains unauthorized access to an Okta administrator account.
- The attacker authenticates to the Okta admin console.
- Attacker navigates to the Applications section in the Okta admin console.
- The attacker identifies a target application for modification or deletion.
- If modifying, the attacker alters application settings such as permissions, user assignments, or SSO configurations.
- If deleting, the attacker initiates the application deletion process.
- Okta logs the “application.lifecycle.update” or “application.lifecycle.delete” event.
- The change impacts end-users and their ability to access resources through the modified or deleted application.
Impact
The impact of unauthorized application modification or deletion can be significant. Modified applications can grant unintended access to sensitive resources, leading to data breaches or privilege escalation. Deleted applications disrupt user access and business operations, potentially causing significant downtime and financial losses. The scope of the impact depends on the criticality of the affected application and the extent of the unauthorized changes.
Recommendation
- Deploy the provided Sigma rule to your SIEM to detect
application.lifecycle.updateorapplication.lifecycle.deleteevents in Okta logs. - Investigate any triggered alerts for unexpected application modifications or deletions, focusing on the user account that initiated the change (source: Okta logs).
- Review Okta administrator account access and enforce multi-factor authentication to prevent unauthorized access (reference: Okta documentation on security best practices).
Detection coverage 2
Okta Application Modified or Deleted
mediumDetects when an application is modified or deleted in Okta.
Okta Application Update with Suspicious Scope Change
highDetects when an application's scope is modified in Okta, potentially granting unauthorized access.
Detection queries are kept inside the platform. Get full rules →