Detectionmediumtest

Okta Application Sign-On Policy Modified or Deleted

Detects when an application Sign-on Policy is modified or deleted.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Austin SongerCreated Sun Sep 12Updated Sun Oct 098f668cc4-c18e-45fe-ad00-624a981cf88aidentity
Log Source
Oktaokta
ProductOkta← raw: okta
Serviceokta← raw: okta
Detection Logic
Detection Logic1 selector
detection:
    selection:
        eventtype:
            - application.policy.sign_on.update
            - application.policy.sign_on.rule.delete
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

MITRE ATT&CK
Rule Metadata
Rule ID
8f668cc4-c18e-45fe-ad00-624a981cf88a
Status
test
Level
medium
Type
Detection
Created
Sun Sep 12
Modified
Sun Oct 09
Path
rules/identity/okta/okta_application_sign_on_policy_modified_or_deleted.yml
Raw Tags
attack.impact
View on GitHub