Skip to content

Conversation

@threat-punter
Copy link
Contributor

Issues

Resolves #8

Summary

An adversary may attempt to modify or delete the sign on policy for an Okta application in order to remove or weaken an organization's security controls. Please see #8 for further details and example events that will trigger this rule.

Contributor checklist

@cla-checker-service
Copy link

cla-checker-service bot commented Jul 1, 2020

💚 CLA has been signed

@threat-punter threat-punter force-pushed the attempt-to-modify-or-delete-okta-application-sign-on-policy branch from 776874d to a3b9be6 Compare July 1, 2020 23:23
@threat-punter threat-punter reopened this Jul 1, 2020
@threat-punter threat-punter self-assigned this Jul 1, 2020
@threat-punter threat-punter added the Rule: New Proposal for new rule label Jul 1, 2020
@rw-access rw-access removed their request for review July 1, 2020 23:28
Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>
Copy link
Contributor

@brokensound77 brokensound77 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just the one suggestion on the name, otherwise LGTM 👍

…n_policy.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>
@threat-punter
Copy link
Contributor Author

Verified that the updated query matches the desired events.

image

Add event.category and event.type values to query
@threat-punter threat-punter requested a review from peasead July 2, 2020 14:28
@threat-punter threat-punter merged commit f438a22 into elastic:main Jul 2, 2020
@threat-punter threat-punter deleted the attempt-to-modify-or-delete-okta-application-sign-on-policy branch July 20, 2020 18:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[New Rule] Attempt to Modify or Delete Okta Application Sign On Policy

4 participants