Detectionmediumtest
Okta Application Sign-On Policy Modified or Deleted
Detects when an application Sign-on Policy is modified or deleted.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Oktaokta
ProductOkta← raw: okta
Serviceokta← raw: okta
Detection Logic
Detection Logic1 selector
detection:
selection:
eventtype:
- application.policy.sign_on.update
- application.policy.sign_on.rule.delete
condition: selectionFalse Positives
Unknown
False positive likelihood has not been assessed. Additional context may be needed during triage.
MITRE ATT&CK
Tactics
Rule Metadata
Rule ID
8f668cc4-c18e-45fe-ad00-624a981cf88a
Status
test
Level
medium
Type
Detection
Created
Sun Sep 12
Modified
Sun Oct 09
Author
Path
rules/identity/okta/okta_application_sign_on_policy_modified_or_deleted.yml
Raw Tags
attack.impact