From 9d3395f9e3e9fa4840e87dfd43ed7691e1d97427 Mon Sep 17 00:00:00 2001 From: David French <56409778+threat-punter@users.noreply.github.com> Date: Tue, 17 Nov 2020 08:53:59 -0700 Subject: [PATCH] Create okta_attempt_to_delete_okta_application.toml (#497) --- ...ta_attempt_to_delete_okta_application.toml | 37 +++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 rules/okta/okta_attempt_to_delete_okta_application.toml diff --git a/rules/okta/okta_attempt_to_delete_okta_application.toml b/rules/okta/okta_attempt_to_delete_okta_application.toml new file mode 100644 index 000000000..e31d467da --- /dev/null +++ b/rules/okta/okta_attempt_to_delete_okta_application.toml @@ -0,0 +1,37 @@ +[metadata] +creation_date = "2020/11/06" +ecs_version = ["1.6.0"] +maturity = "production" +updated_date = "2020/11/06" + +[rule] +author = ["Elastic"] +description = """ +Detects attempts to delete an Okta application. An adversary may attempt to modify, deactivate, or delete an Okta +application in order to weaken an organization's security controls or disrupt their business operations. +""" +false_positives = [ + """ + Consider adding exceptions to this rule to filter false positives if your organization's Okta applications are + regularly deleted and the behavior is expected. + """, +] +index = ["filebeat-*", "logs-okta*"] +language = "kuery" +license = "Elastic License" +name = "Attempt to Delete an Okta Application" +note = "The Okta Fleet integration or Filebeat module must be enabled to use this rule." +references = [ + "https://developer.okta.com/docs/reference/api/system-log/", + "https://developer.okta.com/docs/reference/api/event-types/", +] +risk_score = 21 +rule_id = "d48e1c13-4aca-4d1f-a7b1-a9161c0ad86f" +severity = "low" +tags = ["Elastic", "Identity", "Okta", "Continuous Monitoring", "SecOps", "Monitoring"] +type = "query" + +query = ''' +event.dataset:okta.system and event.action:application.lifecycle.delete +''' +