Okta - Policy creation

Log type: Okta

Playbook Description

This playbook disables self-service account unlock for a flagged user by creating or updating an Okta group. It then adds the user to the group, and applies a password policy with a rule that denies self-service unlock access.

MITRE D3FEND mapping

Tactics Techniques Sub-techniques
Evict(D3-Evict) Credential Eviction(D3-CE) Account Locking(D3-AL)

Playbook input type

Log

Prerequisites

  • Okta configuration - Need to connect Okta using API key.

Playbook creation input

  • connectionName - Provide the VirusTotal connection name for executing the VirusTotal APIs

Dependencies

Extension - okta

  • okta_listgroup
  • okta_creategroup
  • okta_addtogroup
  • okta_createpolicyrule

Connections

Okta Connection - Provide the okta connection name for executing the Okta APIs.

Execution workflow

Investigation:

  • Retrieves the target group details including group name, policy name, and policy rule name.
  • Builds a search filter to check if the target group already exists in Okta.
  • Lists groups using the search filter to verify group existence.

Decision logic:

  • Proceeds based on the following conditions:
    • If the group already exists, adds the user directly to the existing group and proceeds to validation.
    • If the group does not exist, proceeds to create the group, policy, and rule.

Remediation (group does not exist):

  • Creates a new group in Okta.
  • Adds the user to the newly created group.
  • Builds the request data for a password policy rule to deny self-service unlock.
  • Creates a password policy and associates it with the target group.
  • Creates a password policy rule that denies self-service unlock for the group members.
Execution Workflow
Figure: Execution workflow of the playbook