Okta Policy Rule Modification or Deletion
An Okta policy rule was modified or deleted, potentially weakening security controls.
Okta is a widely used identity and access management platform. Threat actors may target Okta configurations to weaken an organization’s security posture. This activity involves modifications or deletions of policy rules within Okta. Such changes can reduce the effectiveness of multi-factor authentication (MFA) requirements, bypass access controls, or disable security logging. Detection of these changes is crucial to maintaining a strong security baseline and preventing unauthorized access to sensitive resources. Defenders should monitor Okta logs for unexpected or unauthorized policy rule modifications or deletions.
Attack Chain
- Initial Access: The attacker gains unauthorized access to an Okta administrator account, possibly through credential theft or phishing.
- Authentication: The attacker authenticates to the Okta admin dashboard using the compromised credentials.
- Discovery: The attacker enumerates existing policy rules to understand the current security configuration.
- Modification: The attacker modifies an existing policy rule to weaken its security controls. This could involve disabling MFA, bypassing location restrictions, or altering group membership requirements.
- Deletion: Alternatively, the attacker deletes a policy rule entirely, effectively removing a layer of security.
- Privilege Escalation: With weakened or removed policy rules, the attacker escalates privileges, gaining access to sensitive applications or data.
- Lateral Movement: The attacker leverages the compromised Okta environment to move laterally within the organization’s network, accessing additional systems and resources.
- Impact: The attacker achieves their final objective, such as data exfiltration, financial fraud, or system disruption, due to the weakened security posture.
Impact
Successful modification or deletion of Okta policy rules can severely compromise an organization’s security. Consequences include unauthorized access to sensitive data, privilege escalation, lateral movement, and ultimately, data breaches or financial loss. The number of affected users and systems depends on the scope of the compromised policy rules and the attacker’s subsequent actions. Organizations in all sectors that rely on Okta for identity management are vulnerable.
Recommendation
- Deploy the “Okta Policy Rule Modified or Deleted” Sigma rule to your SIEM to detect unauthorized changes (rule reference).
- Review Okta system logs regularly for policy rule modifications or deletions, focusing on unusual source IPs or user agents.
- Implement multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access (reference: Okta documentation).
- Enforce the principle of least privilege for Okta administrator roles, limiting the number of users who can modify policy rules.
- Alert on eventType
policy.rule.updateorpolicy.rule.deletein Okta logs using the provided Sigma rule (rule reference).
Detection coverage 2
Okta Policy Rule Modified or Deleted
mediumDetects when an Okta Policy Rule is Modified or Deleted.
Okta Policy Rule Update with MFA Disabled
highDetects modifications to Okta policy rules that disable or weaken MFA requirements.
Detection queries are kept inside the platform. Get full rules →