From 3e2cf4f53e57de31e42943698dac931cafcd7f55 Mon Sep 17 00:00:00 2001 From: Austin Songer Date: Wed, 22 Sep 2021 01:44:20 -0500 Subject: [PATCH] [New Rule] Okta User Attempted Unauthorized Access (#1209) --- ...ta_user_attempted_unauthorized_access.toml | 60 +++++++++++++++++++ 1 file changed, 60 insertions(+) create mode 100644 rules/okta/initial_access_okta_user_attempted_unauthorized_access.toml diff --git a/rules/okta/initial_access_okta_user_attempted_unauthorized_access.toml b/rules/okta/initial_access_okta_user_attempted_unauthorized_access.toml new file mode 100644 index 000000000..c3938cc4d --- /dev/null +++ b/rules/okta/initial_access_okta_user_attempted_unauthorized_access.toml @@ -0,0 +1,60 @@ +[metadata] +creation_date = "2021/05/14" +maturity = "production" +updated_date = "2021/05/14" + +[rule] +author = ["Elastic", "Austin Songer"] +description = "Identifies when an unauthorized access attempt is made by a user for an Okta application." +index = ["filebeat-*", "logs-okta*"] +language = "kuery" +license = "Elastic License v2" +name = "Unauthorized Access to an Okta Application" +note = """## Config + +The Okta Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.""" +risk_score = 21 +rule_id = "4edd3e1a-3aa0-499b-8147-4d2ea43b1613" +severity = "low" +tags = ["Elastic", "Identity", "Okta", "Continuous Monitoring", "SecOps", "Identity and Access"] +timestamp_override = "event.ingested" +type = "query" + +query = ''' +event.dataset:okta.system and event.action:app.generic.unauth_app_access_attempt +''' + + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +name = "Valid Accounts" +id = "T1078" +reference = "https://attack.mitre.org/techniques/T1078/" + + +[rule.threat.tactic] +name = "Initial Access" +id = "TA0001" +reference = "https://attack.mitre.org/tactics/TA0001/" +[[rule.threat]] +framework = "MITRE ATT&CK" + +[rule.threat.tactic] +name = "Defense Evasion" +id = "TA0005" +reference = "https://attack.mitre.org/tactics/TA0005/" +[[rule.threat]] +framework = "MITRE ATT&CK" + +[rule.threat.tactic] +name = "Persistence" +id = "TA0003" +reference = "https://attack.mitre.org/tactics/TA0003/" +[[rule.threat]] +framework = "MITRE ATT&CK" + +[rule.threat.tactic] +name = "Privilege Escalation" +id = "TA0004" +reference = "https://attack.mitre.org/tactics/TA0004/"