Okta policy rule modified to downgrade MFA

Goal

Detects modification of an Okta policy rule that downgrades multi‑factor authentication to 1FA. Alerts when a policy rule is updated to require single‑factor authentication.

Strategy

This rule monitors when an administrator updates an Okta policy rule, indicating by a policy.rule.update event. The policy rule action details includes the previous and updated policy rule. When the previous policy logic does not contain 1FA but the updated logic does, an alert will trigger.

A higher‑severity alert is generated when the source IP address has been classified as suspicious or malicious. Downgrading multi-factor authentication requirements reduces security posture and can be used by an attacker to maintain persistence. The change also increases likelihood of an account compromise through social engineering or credential compromise.

Triage & Response

  • Examine @target.changeDetails.from.policyRuleActionJson and @target.changeDetails.to.policyRuleActionJson to verify the exact requirement change.
  • Identify the administrator and source IP {{@network.client.ip}} associated with the action.
  • Check for additional policy, group, or application changes by the same actor to assess scope and potential misuse.
  • Determine which users and applications are governed by {{@target.displayName}} and evaluate the risk of single‑factor access.
  • If the policy change event is unexpected or resulted in suspicious activities, initiate your incident response plan.