Detects attempts to modify an Okta policy. An adversary may attempt to modify an Okta policy in order to weaken an organization’s security controls. For example, an adversary may attempt to modify an Okta multi-factor authentication (MFA) policy in order to weaken the authentication requirements for user accounts.
Rule type: query
Risk score: 21
Runs every: 5 minutes
Maximum alerts per execution: 100
- Continuous Monitoring
Version: 4 (version history)
Added (Elastic Stack release): 7.9.0
Last modified (Elastic Stack release): 7.11.2
Rule authors: Elastic
Rule license: Elastic License
Consider adding exceptions to this rule to filter false positives if Okta policies are regularly modified in your organization.
The Okta Fleet integration or Filebeat module must be enabled to use this rule.
event.dataset:okta.system and event.action:policy.lifecycle.update
- Version 4 (7.11.2 release)
- Formatting only
- Version 3 (7.11.0 release)
- Rule name changed from: Attempt to Modify Okta Policy
- Version 2 (7.10.0 release)
Updated query, changed from:
event.module:okta and event.dataset:okta.system and event.action:policy.lifecycle.update