이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect when the multi-factor authentication (MFA) factors for an enrolled Okta user are reset.
Strategy
This rule lets you monitor the following Okta event to determine when a user’s MFA factors are reset:
user.mfa.factor.reset_all
An attacker may attempt to reset MFA factors in a bid to access other user accounts by registering new attacker-controlled MFA factors.
Triage and response
- Determine if the user:
{{@usr.email}}
should have reset the MFA factors of the targeted user. - If the change was not made by the user:
- Disable the affected user accounts.
- Rotate user credentials.
- Return targeted users MFA factors to the last known good state.
- Begin your organization’s incident response process and investigate.
- If the change was made by the user:
- Determine if the user was authorized to make that change.
- If Yes, ensure the targeted user has new MFA factors assigned in accordance with organization policies.
- If No, verify there are no other signals from the Okta administrator:
{{@usr.email}}
.