Attempted Bypass of Okta MFA
Elastic Stack Serverless Security
Detects attempts to bypass Okta multi-factor authentication (MFA). An adversary may attempt to bypass the Okta MFA policies configured for an organization in order to obtain unauthorized access to an application.
Rule type: query
Rule indices:
- filebeat-*
- logs-okta*
Severity: high
Risk score: 73
Runs every: 5m
Searches indices from: None (https://www.elastic.co/guide/en/elasticsearch/reference/current/common-options.html#date-math[Date Math format], see also Additional look-back time
)
Maximum alerts per execution: 100
References:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
Tags:
- Elastic
- Identity
- Okta
- Continuous Monitoring
- SecOps
- Identity and Access
Version: 8
Rule authors:
- Elastic
Rule license: Elastic License v2
event.dataset:okta.system and event.action:user.mfa.attempt_bypass
Framework: MITRE ATT&CKTM
Tactic:
- Name: Credential Access
- ID: TA0006
- Reference URL: https://attack.mitre.org/tactics/TA0006/
Technique:
- Name: Multi-Factor Authentication Interception
- ID: T1111
- Reference URL: https://attack.mitre.org/techniques/T1111/