A generic security incident response playbook for investigating and responding to potential compromises of Okta's internal systems, in the context of a customer or partner of Okta that uses their platform.
Action Item | Event Types to Analyze |
---|---|
|
|
|
|
|
|
|
|
|
If AWS is integrated with Okta SSO (example)
- Identify all IAM Users and associated active IAM keys used for Okta SSO AWS integration
- Search AWS CloudTrail logs for unusual activity associated with IAM permissions granted to IAM Users used for Okta SSO integration
If AWS is integrated with Okta SSO (example)
- Rotate IAM keys used for Okta SSO integration
- Apply IP address allowlist rules to IAM policies used by IAM principals (AWS guide) (Okta IP allowlist)