<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Policy-Tampering — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/policy-tampering/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/policy-tampering/feed.xml" rel="self" type="application/rss+xml"/><item><title>Okta Application Sign-On Policy Modified or Deleted</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-sign-on-policy-changes/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-sign-on-policy-changes/</guid><description>Attackers may modify or delete Okta application sign-on policies to weaken security controls, potentially leading to unauthorized access and data breaches.</description><content:encoded><![CDATA[<p>Okta application sign-on policies control how users authenticate to applications integrated with Okta. An attacker who gains administrative access to an Okta tenant can modify or delete these policies, effectively weakening or bypassing multi-factor authentication (MFA) requirements and other security controls. This allows unauthorized access to sensitive applications and data. While this activity itself is not initial access, it represents a significant escalation of privileges and a deliberate attempt to subvert existing security measures within the Okta environment. Detection of these changes is critical to identify potential breaches early and prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an Okta administrator account through compromised credentials or other means.</li>
<li>The attacker authenticates to the Okta admin dashboard.</li>
<li>The attacker navigates to the &ldquo;Security&rdquo; section and then to &ldquo;Authentication Policies&rdquo;.</li>
<li>The attacker identifies the target application sign-on policy to modify or delete.</li>
<li>To modify, the attacker changes the policy rules, such as disabling MFA requirements or allowing access from untrusted locations.</li>
<li>Alternatively, to delete, the attacker selects the policy and confirms its removal.</li>
<li>The attacker&rsquo;s actions are logged as &ldquo;application.policy.sign_on.update&rdquo; or &ldquo;application.policy.sign_on.rule.delete&rdquo; events in the Okta system log.</li>
<li>Unauthorized users can now access applications protected by the modified or deleted policy, potentially leading to data exfiltration or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Okta application sign-on policies can severely compromise an organization&rsquo;s security posture. This can lead to unauthorized access to sensitive applications and data, resulting in data breaches, financial losses, and reputational damage. The number of affected users and applications depends on the scope of the compromised policies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta Application Sign-On Policy Modified or Deleted&rdquo; to your SIEM and tune for your environment to detect changes to sign-on policies (rule reference).</li>
<li>Monitor the Okta system log for &ldquo;application.policy.sign_on.update&rdquo; and &ldquo;application.policy.sign_on.rule.delete&rdquo; events to identify suspicious activity (log source reference).</li>
<li>Implement strong access controls and MFA for Okta administrator accounts to prevent unauthorized policy modifications (best practice).</li>
<li>Regularly review Okta application sign-on policies to ensure they are properly configured and meet security requirements (best practice).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>policy-tampering</category></item></channel></rss>