[New Rule] Attempt to Modify or Delete Okta Application Sign On Policy (#10)

* Add okta rule for policy modification/delete

* Update rule name

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>

* Update rules/okta/okta_attempt_to_modify_or_delete_application_sign_on_policy.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>

* Add event.module value to query

* Update okta_attempt_to_modify_or_delete_application_sign_on_policy.toml

Add event.category and event.type values to query

* Update rules/okta/okta_attempt_to_modify_or_delete_application_sign_on_policy.toml

Co-authored-by: Ross Wolf <31489089+rw-access@users.noreply.github.com>
Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>
This commit is contained in:
David French
2020-07-02 08:52:55 -06:00
committed by GitHub
parent a3b9be60d7
commit f438a222d5
@@ -0,0 +1,35 @@
[metadata]
creation_date = "2020/07/01"
ecs_version = ["1.5.0"]
maturity = "production"
updated_date = "2020/07/01"
[rule]
author = ["Elastic"]
description = """
An adversary may attempt to modify or delete the sign on policy for an Okta application in order to remove or weaken an
organization's security controls.
"""
false_positives = [
"""
Consider adding exceptions to this rule to filter false positives if sign on policies for Okta applications are
regularly modified or deleted in your organization.
""",
]
index = ["filebeat-*"]
language = "kuery"
license = "Elastic License"
name = "Modification or Removal of an Okta Application Sign-On Policy"
references = [
"https://developer.okta.com/docs/reference/api/system-log/",
"https://developer.okta.com/docs/reference/api/event-types/",
]
risk_score = 47
rule_id = "cd16fb10-0261-46e8-9932-a0336278cdbe"
severity = "medium"
tags = ["Elastic", "Okta"]
type = "query"
query = '''
event.module:okta and event.dataset:okta.system and event.action:(application.policy.sign_on.update or application.policy.sign_on.rule.delete)
'''