Detectionmediumtest
Okta Admin Role Assigned to an User or Group
Detects when an the Administrator role is assigned to an user or group.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Oktaokta
ProductOkta← raw: okta
Serviceokta← raw: okta
Detection Logic
Detection Logic1 selector
detection:
selection:
eventtype:
- group.privilege.grant
- user.account.privilege.grant
condition: selectionFalse Positives
Administrator roles could be assigned to users or group by other admin users.
MITRE ATT&CK
Sub-techniques
Rule Metadata
Rule ID
413d4a81-6c98-4479-9863-014785fd579c
Status
test
Level
medium
Type
Detection
Created
Sun Sep 12
Modified
Sun Oct 09
Author
Path
rules/identity/okta/okta_admin_role_assigned_to_user_or_group.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.t1098.003