Okta Failed SSO Attempts

Original Source: [splunk source]
Name:Okta Failed SSO Attempts
id:371a6545-2618-4032-ad84-93386b8698c5
version:4
date:2024-10-17
author:Michael Haag, Rico Valdez, Splunk
status:deprecated
type:Anomaly
Description:**DEPRECATION NOTE** - This search has been deprecated and replaced with this detection `Okta Unauthorized Access to Application - DM`. The following anomaly identifies failed Okta SSO events utilizing the legacy Okta event "unauth app access attempt".
Data_source:
search:`okta` eventType=app.generic.unauth_app_access_attempt
| stats min(_time) as firstTime max(_time) as lastTime values(app) as Apps count by src_user, result ,displayMessage, src_ip
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `okta_failed_sso_attempts_filter`


how_to_implement:This search is specific to Okta and requires Okta logs are being ingested in your Splunk deployment.
known_false_positives:There may be a faulty config preventing legitmate users from accessing apps they should have access to.
References:
  -https://developer.okta.com/docs/reference/api/event-types/?q=app.generic.unauth_app_access_attempt
drilldown_searches:
  :
tags:
  analytic_story:
    - 'Suspicious Okta Activity'
  asset_type:Infrastructure
  confidence:40
  impact:40
  message:$src_user$ failed SSO authentication to the app.
  mitre_attack_id:
    - 'T1078'
    - 'T1078.001'
  observable:
    name:'src_user'
    type:'User'
    - role:
      - 'Victim'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - '_time'
    - 'displayMessage'
    - 'app'
    - 'src_user'
    - 'result'
    - 'src_ip'
  risk_score:16
  security_domain:access

tests:
  :
manual_test:None

Related Analytic Stories


Suspicious Okta Activity