Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Rule Tuning] Multiple Okta User Auth Events with Same Device Token Hash Behind a Proxy #4119

Open
brokensound77 opened this issue Oct 2, 2024 · 0 comments
Labels
Integration: Okta okta related rules Rule: Tuning tweaking or tuning an existing rule Team: TRADE

Comments

@brokensound77
Copy link
Contributor

brokensound77 commented Oct 2, 2024

Link to Rule

https://github.com/elastic/detection-rules/blob/51859e57f3e55b0478056c3be6ee27ea9154a70a/rules/integrations/okta/credential_access_multiple_auth_events_from_single_device_behind_proxy.toml

Rule Tuning Type

(This should be a multi-select not single)

Description

There are several considerations for tuning this rule:

Removing the requirement to be behind a proxy

Basically remove: and okta.security_context.is_proxy:true.

Compare to similar internal variants: 5dd1a0f0-932d-4b9c-a061-d0043d49300c, 0e157bf1-5c9b-4d42-ba0c-2aba0e897337

Explore whether DT Hash is subject to change during auth workflow and after session is established

After discussing with @terrancedejesus, there is concern that the dt_hash may potential change unexpectedly, based on how it is used in the rules. Need to confirm and adjust as necessary

Example Data

No response

@brokensound77 brokensound77 added Rule: Tuning tweaking or tuning an existing rule Team: TRADE Integration: Okta okta related rules labels Oct 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Integration: Okta okta related rules Rule: Tuning tweaking or tuning an existing rule Team: TRADE
Projects
None yet
Development

No branches or pull requests

1 participant