Okta Hardening Guide
Identity Provider hardening for SSO, MFA policies, and API token security
Overview
Okta is an identity and access management (IAM) platform that controls authentication for 18,000+ organizations with 7,000+ integrations in its network. As the central authentication provider for enterprise applications, Okta represents the highest-leverage hardening target in most organizations. The 2022 LAPSUS$ breach and October 2023 support system breach (affecting all 18,400 customers via HAR file exfiltration) demonstrated how stolen session tokens grant attackers SSO access to thousands of downstream applications.
Intended Audience
- Security engineers managing identity infrastructure
- IT administrators configuring Okta tenants
- GRC professionals assessing IAM compliance
- Third-party risk managers evaluating SSO integrations
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Okta-specific security configurations including authentication policies, OAuth/SCIM governance, session management, and integration security. Infrastructure hardening for Okta agents is out of scope.
Table of Contents
- Authentication & Access Controls
- Network Access Controls
- OAuth & Integration Security
- Session Management
- Monitoring & Detection
- Third-Party Integration Security
- Operational Security
- Compliance Quick Reference
1. Authentication & Access Controls
1.1 Enforce Phishing-Resistant MFA (FIDO2/WebAuthn)
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 6.5 |
| NIST 800-53 | IA-2(1), IA-2(6) |
| DISA STIG | V-273190, V-273191, V-273193 (HIGH), V-273194 (HIGH) |
Description
Require phishing-resistant authenticators (FIDO2 security keys or platform authenticators) for all users, especially administrators. This eliminates vulnerabilities to real-time phishing proxies that bypass TOTP and push-based MFA.
Rationale
Why This Matters:
- TOTP and push notifications can be intercepted via real-time phishing (Evilginx, Modlishka)
- The October 2023 Okta breach was enabled by session cookie theft from HAR files
- FIDO2 binds authentication to specific origins, preventing token theft
Attack Prevented: Real-time phishing, session hijacking, MFA bypass
Real-World Incidents:
- October 2023 Okta Support Breach: HAR files containing session cookies were exfiltrated, affecting all 18,400 customers
- January 2022 LAPSUS$ Breach: Third-party support engineer compromised via social engineering
Prerequisites
- Okta tenant with MFA capabilities
- FIDO2-compatible security keys (YubiKey 5 series, Google Titan)
- Super Admin access for policy configuration
- User inventory for phased rollout
ClickOps Implementation
Step 1: Enable FIDO2 (WebAuthn) as Authenticator
- Navigate to: Security → Authenticators
- Click Add Authenticator → Select FIDO2 (WebAuthn)
- Configure:
- User verification: Required
- Authenticator attachment: Cross-platform (for security keys) or Platform (for biometrics)
- Click Add
Step 2: Create Phishing-Resistant Authentication Policy
- Navigate to: Security → Authentication Policies
- Click Add Policy → Name: “Phishing-Resistant MFA”
- Add Rule:
- IF: User is member of “Administrators” group
- THEN: Authentication requires FIDO2 (WebAuthn)
- Re-authentication frequency: Every session
- Save and set priority above default policies
Step 3: Enforce for All Admin Access
- Navigate to: Security → Global Session Policy
- Create rule for Admin Console access requiring FIDO2
- Apply to Admin groups
Step 4: Configure Authentication Policy Requirements Configure both Okta Dashboard and Admin Console policies:
- Navigate to: Security → Authentication Policies
- Click the Okta Dashboard policy
- Click Actions next to the top rule → Edit
- In “User must authenticate with”, select Password/IdP + Another factor or Any 2 factor types
- In “Possession factor constraints are” section, check Phishing resistant
- Repeat for the Okta Admin Console policy
| Specification | Requirement |
|---|---|
| DISA STIG V-273190, V-273191 | Phishing resistant box must be checked for Dashboard and Admin Console |
| DISA STIG V-273193, V-273194 (HIGH) | MFA required: “Password/IdP + Another factor” or “Any 2 factor types” |
Time to Complete: ~30 minutes (policy) + user enrollment time
Code Implementation
Code Pack: Terraform
# Enable FIDO2 (WebAuthn) as an authenticator
resource "okta_authenticator" "fido2" {
name = "FIDO2 WebAuthn"
key = "webauthn"
status = "ACTIVE"
settings = jsonencode({
userVerification = "REQUIRED"
attachment = "ANY"
})
}
# Signon policy requiring phishing-resistant MFA for admins
resource "okta_policy_signon" "phishing_resistant" {
name = "Phishing-Resistant MFA Policy"
status = "ACTIVE"
description = "Requires FIDO2 for all admin access"
priority = 1
groups_included = [var.admin_group_id]
}
# Rule enforcing FIDO2 on the phishing-resistant policy
resource "okta_policy_rule_signon" "require_fido2" {
policy_id = okta_policy_signon.phishing_resistant.id
name = "Require FIDO2"
status = "ACTIVE"
priority = 1
access = "ALLOW"
mfa_required = true
mfa_prompt = "ALWAYS"
primary_factor = "PASSWORD_IDP_ANY_FACTOR"
session_lifetime = 120
session_persistent = false
}
Code Pack: API Script
# Create FIDO2 authenticator policy
info "1.1 Creating phishing-resistant MFA policy..."
POLICY_RESPONSE=$(okta_post "/api/v1/policies" '{
"type": "ACCESS_POLICY",
"name": "Phishing-Resistant MFA Policy",
"description": "Requires FIDO2 for sensitive applications",
"priority": 1,
"conditions": {
"people": {
"groups": {
"include": ["EVERYONE"]
}
}
}
}') || {
fail "1.1 Failed to create MFA policy"
increment_failed
summary
exit 0
}
POLICY_ID=$(echo "${POLICY_RESPONSE}" | jq -r '.id // empty' 2>/dev/null || true)
# Create policy rule requiring WebAuthn
info "1.1 Creating policy rule requiring FIDO2..."
okta_post "/api/v1/policies/${POLICY_ID}/rules" '{
"name": "Require FIDO2",
"priority": 1,
"conditions": {
"network": {
"connection": "ANYWHERE"
}
},
"actions": {
"signon": {
"access": "ALLOW",
"requireFactor": true,
"factorPromptMode": "ALWAYS",
"primaryFactor": "PASSWORD_IDP_ANY_FACTOR",
"factorLifetime": 0
}
}
}' > /dev/null 2>&1 || warn "1.1 Policy rule creation returned non-zero (may already exist)"
Code Pack: Sigma Detection Rule
detection:
selection:
eventType: 'user.authentication.auth_via_mfa'
debugContext.debugData.factor: 'FIDO2_WEBAUTHN'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- client.ipAddress
- debugContext.debugData.factor
- outcome.result
- published
Validation & Testing
- Attempt admin login with only password - should be blocked
- Attempt admin login with TOTP - should be blocked (if FIDO2 required)
- Complete admin login with FIDO2 key - should succeed
- Review System Log for successful WebAuthn authentications
Expected result: Only FIDO2-authenticated sessions can access admin console
Monitoring & Maintenance
Ongoing monitoring:
- Alert on authentication attempts that fail FIDO2 requirement
- Monitor for users bypassing policy via legacy sessions
Log query: See Code Pack section 1.1 (cli) above for the System Log filter expression.
Maintenance schedule:
- Monthly: Review FIDO2 enrollment completion rates
- Quarterly: Audit policy exceptions and temporary bypasses
- Annually: Review authenticator hardware lifecycle (key expiration)
Operational Impact
| Aspect | Impact Level | Details |
|---|---|---|
| User Experience | Medium | Users must carry/use security keys |
| System Performance | None | No performance impact |
| Maintenance Burden | Medium | Key distribution and replacement |
| Rollback Difficulty | Easy | Can disable policy rule |
Potential Issues:
- Lost security keys require backup authentication method
- Platform authenticators may not work on shared devices
Rollback Procedure:
- Navigate to Authentication Policy
- Disable or lower priority of FIDO2 requirement rule
- Enable fallback MFA methods temporarily
1.2 Implement Admin Role Separation
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4, 6.8 |
| NIST 800-53 | AC-5, AC-6(1) |
Description
Separate administrative privileges using Okta’s custom admin roles instead of granting Super Admin access. Create role-specific permissions for Help Desk, Application Admins, and Read-Only Auditors.
Rationale
Why This Matters:
- Super Admin compromise provides complete tenant control
- LAPSUS$ attack leveraged over-privileged support access
- Least privilege limits blast radius of compromised accounts
Attack Prevented: Privilege escalation, lateral movement via admin accounts
ClickOps Implementation
Step 1: Create Custom Admin Roles
- Navigate to: Security → Administrators → Roles
- Click Create new role
- Create the following roles:
Help Desk Admin:
- Reset passwords
- Unlock accounts
- View user profiles
- NO: Edit policies, manage apps, access API tokens
Application Admin:
- Manage specific applications
- Configure SAML/OIDC settings
- NO: Manage users, access system settings
Security Auditor (Read-Only):
- View all configurations
- Access System Log
- NO: Make any changes
Step 2: Assign Roles to Specific Groups
- Navigate to: Security → Administrators
- Click Add Administrator
- Select user/group and assign custom role
- Limit scope to specific apps/groups if applicable
Code Implementation
Code Pack: API Script
# Create custom Help Desk Admin role
info "1.2 Creating Help Desk Admin custom role..."
okta_post "/api/v1/iam/roles" '{
"label": "Help Desk Admin",
"description": "Limited admin for password resets and account unlocks",
"permissions": [
"okta.users.read",
"okta.users.credentials.resetPassword",
"okta.users.lifecycle.unlock"
]
}' > /dev/null 2>&1 && {
pass "1.2 Help Desk Admin role created"
increment_applied
} || {
fail "1.2 Failed to create Help Desk Admin role"
increment_failed
}
1.3 Enable Hardware-Bound Session Tokens
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | SC-23, IA-11 |
Description
Configure Okta to bind session tokens to specific devices using device trust and Okta FastPass, preventing session token theft and replay attacks.
Rationale
Why This Matters:
- The October 2023 breach exploited stolen session cookies from HAR files
- Device-bound tokens cannot be replayed from different devices
- Okta FastPass provides passwordless + phishing-resistant authentication
Real-World Incidents:
- October 2023: Attackers exfiltrated HAR files containing session tokens from Okta support portal
ClickOps Implementation
Step 1: Enable Okta Verify with FastPass
- Navigate to: Security → Authenticators
- Click Okta Verify → Edit
- Enable:
- Okta FastPass: On
- User verification with Okta FastPass: Required
- Save
Step 2: Configure Device Trust
- Navigate to: Security → Device Integrations
- Configure device trust for managed devices:
- Jamf Pro for macOS
- Microsoft Intune for Windows
- VMware Workspace ONE
- Create policy requiring managed devices
Step 3: Create Device-Bound Session Policy
- Navigate to: Security → Authentication Policies
- Create rule:
- Condition: Device trust = Not trusted
- Action: Deny access OR require additional verification
1.4 Configure Password Policy
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | IA-5(1) |
| DISA STIG | V-273195, V-273196, V-273197, V-273198, V-273199, V-273200, V-273201, V-273208, V-273209 |
Description
Configure comprehensive password policies with appropriate complexity, age, and history requirements. These controls protect against weak passwords, password reuse, and rapid password cycling.
Prerequisites
- Super Admin access
- Okta-mastered users (not applicable if using external directory services)
Specification Requirements
| Requirement | L1 (Baseline) | L2/L3 (DISA STIG) |
|---|---|---|
| Minimum length | 12 characters | 15 characters |
| Uppercase required | Yes | Yes |
| Lowercase required | Yes | Yes |
| Number required | Yes | Yes |
| Special character required | Yes | Yes |
| Minimum password age | — | 24 hours |
| Maximum password age | 90 days | 60 days |
| Common password check | Recommended | Required |
| Password history | 4 generations | 5 generations |
ClickOps Implementation
Step 1: Access Password Authenticator Settings
- Navigate to: Security → Authenticators
- Click the Actions button next to Password
- Select Edit
Step 2: Configure Each Password Policy For each listed Password Policy, click Edit and configure:
Complexity Requirements:
- Minimum Length: Set to at least 15 characters (L2/L3) or 12 (L1)
- Upper case letter: ☑ Checked
- Lower case letter: ☑ Checked
- Number (0-9): ☑ Checked
- Symbol (e.g., !@#$%^&*): ☑ Checked
Password Age Settings:
- Minimum password age is XX hours: Set to at least 24 (prevents rapid cycling)
- Password expires after XX days: Set to 60 (L2/L3) or 90 (L1)
Password History:
- Enforce password history for last XX passwords: Set to 5
Step 3: Enable Common Password Check
- Under Password Settings section
- Check Common Password Check
- Click Save
Code Implementation
Code Pack: API Script
okta_put "/api/v1/policies/${POLICY_ID}" "{
\"settings\": {
\"password\": {
\"complexity\": {
\"minLength\": ${MIN_LENGTH},
\"minLowerCase\": 1,
\"minUpperCase\": 1,
\"minNumber\": 1,
\"minSymbol\": 1
},
\"age\": {
\"maxAgeDays\": ${MAX_AGE_DAYS},
\"minAgeMinutes\": ${MIN_AGE_MINUTES},
\"historyCount\": ${HISTORY_COUNT}
}
}
}
}" > /dev/null 2>&1 && {
updated=$((updated + 1))
} || warn "1.4 Failed to update policy '${POLICY_NAME}'"
Validation
- Navigate to: Security → Authenticators → Password → Edit
- For each policy, verify all settings match the requirements table above
Note: If Okta relies on external directory services for user sourcing, password policy is managed by the connected directory service.
1.5 Configure Account Lockout
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | AC-7 |
| DISA STIG | V-273189 |
Description
Enforce account lockout after consecutive invalid login attempts to protect against brute-force password attacks. This control significantly reduces the risk of unauthorized access via password guessing.
Specification Requirements
| Requirement | L1 (Baseline) | L2/L3 (DISA STIG) |
|---|---|---|
| Lockout threshold | 5 attempts | 3 attempts |
| Lockout duration | 30 minutes | Until admin unlock |
ClickOps Implementation
Step 1: Configure Password Authenticator Lockout
- Navigate to: Security → Authenticators
- Click the Actions button next to Password
- Select Edit
Step 2: Configure Each Password Policy For each listed Password Policy:
- Click Edit on the policy
- Locate the Lock Out section
- Check Lock out after X unsuccessful attempts
- Set the value to 3 (L2/L3) or 5 (L1)
- Click Save
Code Pack: API Script
okta_put "/api/v1/policies/${POLICY_ID}" "{
\"settings\": {
\"password\": {
\"lockout\": {
\"maxAttempts\": ${LOCKOUT_THRESHOLD},
\"autoUnlockMinutes\": 30,
\"showLockoutFailures\": true
}
}
}
}" > /dev/null 2>&1 && {
updated=$((updated + 1))
} || warn "1.5 Failed to update lockout for policy '${POLICY_NAME}'"
Validation
- Navigate to: Security → Authenticators → Password → Edit
- For each policy, verify lockout settings are configured
Note: If Okta relies on external directory services for user sourcing, account lockout is managed by the connected directory service.
1.6 Configure Account Lifecycle Management
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | AC-2(3) |
| DISA STIG | V-273188 |
Description
Automatically disable user accounts after a period of inactivity to reduce the risk of dormant account compromise. Attackers targeting inactive accounts may maintain undetected access since account owners won’t notice unauthorized activity.
Specification Requirements
| Requirement | L1 (Baseline) | L2/L3 (DISA STIG) |
|---|---|---|
| Inactivity threshold | 90 days | 35 days |
| Action | Suspend | Suspend |
Prerequisites
- Okta Workflows license (required for Automations)
- Super Admin or Org Admin access
ClickOps Implementation
Step 1: Create Inactivity Automation
- Navigate to: Workflow → Automations
- Click Add Automation
- Enter a name (e.g., “User Inactivity - Auto Suspension”)
Step 2: Configure Trigger Condition
- Click Add Condition
- Select User Inactivity in Okta
- Set duration to 35 days (L2/L3) or 90 days (L1)
- Click Save
Step 3: Configure Schedule
- Click the edit button next to Select Schedule
- Set Schedule field to Run Daily
- Set Time field to an appropriate time (e.g., 2:00 AM local time)
- Click Save
Step 4: Configure Scope
- Click the edit button next to Select group membership
- In the Applies to field, select Everyone
- Click Save
Step 5: Configure Action
- Click Add Action
- Select Change User lifecycle state in Okta
- In Change user state to, select Suspended
- Click Save
Step 6: Activate Automation
- Click the Inactive button near the top of the screen
- Select Activate
Validation
- Navigate to: Workflow → Automations
- Verify the automation is listed and shows Active status
- Review the automation history after the first scheduled run
Note: If Okta relies on external directory services (e.g., Active Directory) for user sourcing, this automation may not be applicable. The connected directory service must perform this function instead.
1.7 Configure PIV/CAC Smart Card Authentication
Profile Level: L3 (Maximum Security)
| Framework | Control |
|---|---|
| NIST 800-53 | IA-2(12) |
| DISA STIG | V-273204, V-273207 |
Description
Configure Okta to accept Personal Identity Verification (PIV) credentials and Common Access Cards (CAC) for authentication. This enables hardware-based multifactor authentication using approved certificate authorities.
Prerequisites
- Super Admin access
- Approved certificate chain (root and intermediate CA certificates)
- Smart Card IdP capability in your Okta edition
ClickOps Implementation
Step 1: Add Smart Card Authenticator
- Navigate to: Security → Authenticators
- In the Setup tab, click Add authenticator
- Select the configured Smart Card Identity Provider
- Complete the configuration and click Add
Step 2: Configure Smart Card Identity Provider
- Navigate to: Security → Identity Providers
- Click Add identity provider
- Select Smart Card IdP and click Next
- Enter a name for the identity provider (e.g., “CAC Authentication”)
Step 3: Build Certificate Chain
- Click Browse to select your root CA certificate file
- Click Add Another to add intermediate CA certificates
- Continue until the complete certificate chain is uploaded
- Click Build certificate chain
- Verify the chain builds successfully with all certificates shown
- If errors occur, verify certificate order and format
Step 4: Configure User Matching
- In IdP username, select idpuser.subjectAltNameUpn
- This attribute stores identifiers like the Electronic Data Interchange Personnel Identifier (EDIPI)
- In Match Against, select the Okta Profile Attribute where the identifier is stored
- Click Save
Step 5: Activate the Identity Provider
- Verify the IdP status shows Active
- If inactive, click Activate
Validation
- Navigate to: Security → Identity Providers
- Verify Smart Card IdP is listed with Type as “Smart Card”
- Verify Status is “Active”
- Click Actions → Configure and verify certificate chain is from approved CA
1.8 Configure FIPS-Compliant Authenticators
Profile Level: L3 (Maximum Security)
| Framework | Control |
|---|---|
| NIST 800-53 | SC-13 |
| DISA STIG | V-273205 |
Description
Configure Okta Verify to only connect with FIPS-compliant devices. This ensures that authentication uses FIPS 140-2 validated cryptographic modules.
Prerequisites
- Super Admin access
- Okta Verify authenticator enabled
- Users with FIPS-compliant devices (devices that support FIPS 140-2 mode)
ClickOps Implementation
Step 1: Edit Okta Verify Settings
- Navigate to: Security → Authenticators
- In the Setup tab, click Edit next to Okta Verify
Step 2: Enable FIPS Compliance
- Locate the FIPS Compliance field
- Select FIPS-compliant devices only
- Click Save
Validation
- Navigate to: Security → Authenticators
- From the Setup tab, select Edit Okta Verify
- Verify FIPS Compliance is set to “FIPS-compliant devices only”
Note: Enabling FIPS-compliant devices only will prevent users with non-FIPS compliant devices from enrolling in Okta Verify. Ensure users have compatible devices before enabling this setting.
1.9 Audit Default Authentication Policy
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | AC-3, IA-2 |
Description
Audit and mitigate the risk posed by Okta’s immutable Default Authentication Policy, which permits password-only login with no MFA requirement. This built-in policy acts as a catch-all backstop and cannot be modified or deleted. Any application or login flow that falls through to the default policy bypasses all MFA enforcement.
Rationale
Why This Matters:
- Okta ships with a “Default Policy” that allows single-factor (password-only) authentication
- This policy is immutable – it cannot be edited, deleted, or reordered
- It serves as the final catch-all: any login not matched by a higher-priority policy silently falls through to the default
- New applications added to the tenant are assigned to the default policy unless explicitly moved
- Organizations often believe MFA is enforced globally, unaware that the default backstop allows password-only access
Attack Prevented: MFA bypass via policy gap exploitation. An attacker who discovers an application assigned to the default policy can authenticate with stolen credentials alone, completely circumventing phishing-resistant MFA controls configured in other policies.
Real-World Context:
- Obsidian Security Research: Identified that a significant percentage of Okta tenants have applications inadvertently assigned to the default policy, creating silent MFA gaps in otherwise hardened environments
ClickOps Implementation
Step 1: Identify the Default Authentication Policy
- Navigate to: Security → Authentication Policies
- Locate the policy named “Default Policy” – it will be at the bottom of the policy list
- Click the policy to inspect its rules
- Note: The default rule permits access with “Password” only and cannot be changed
Step 2: Audit Application Policy Assignments
- Navigate to: Security → Authentication Policies
- For each authentication policy, click the Applications tab
- Document which applications are assigned to each policy
- Critical: Check the Default Policy → Applications tab
- If ANY applications appear under the Default Policy, they are vulnerable to password-only login
Step 3: Reassign Applications to Explicit Policies
- For each application assigned to the Default Policy:
- Navigate to: Applications → Applications → [App Name]
- Click the Sign On tab
- Under Authentication policy, click Edit
- Select an appropriate custom authentication policy that enforces MFA
- Click Save
- Repeat until the Default Policy has zero applications assigned
Step 4: Create a Catch-All Deny Rule in Custom Policies
- Navigate to: Security → Authentication Policies
- For each custom authentication policy:
- Click Add Rule
- Name: “Catch-All Deny”
- IF: Any user, any device, any network
- THEN: Access is Denied
- Position this rule as the second-to-last rule (above only the default rule)
- This ensures that any request not explicitly permitted by a higher-priority rule is denied rather than falling through
Step 5: Establish Ongoing Governance
- Create a recurring calendar reminder (monthly) to re-audit policy assignments
- Document the policy assignment standard in your security runbook
- Include policy assignment verification in your application onboarding checklist
Time to Complete: ~45 minutes (initial audit) + 5 minutes per application reassignment
Code Implementation
Code Pack: Terraform
# Reference the immutable Default Authentication Policy
data "okta_policy" "default_access" {
name = "Default Policy"
type = "ACCESS_POLICY"
}
# Custom catch-all policy to replace reliance on the default policy
resource "okta_app_signon_policy" "mfa_required" {
name = "MFA Required - All Applications"
description = "Enforces MFA for all applications - prevents fallthrough to default policy"
}
# Catch-all deny rule (lowest priority in custom policy)
resource "okta_app_signon_policy_rule" "catch_all_deny" {
policy_id = okta_app_signon_policy.mfa_required.id
name = "Catch-All Deny"
priority = 99
access = "DENY"
factor_mode = "2FA"
constraints = []
groups_excluded = []
groups_included = ["EVERYONE"]
network_connection = "ANYWHERE"
}
# MFA enforcement rule (higher priority than catch-all)
resource "okta_app_signon_policy_rule" "require_mfa" {
policy_id = okta_app_signon_policy.mfa_required.id
name = "Require MFA"
priority = 1
access = "ALLOW"
factor_mode = "2FA"
groups_included = ["EVERYONE"]
network_connection = "ANYWHERE"
re_authentication_frequency = "PT2H"
}
Code Pack: API Script
# Find the default policy (system=true)
DEFAULT_POLICY_ID=$(okta_get "/api/v1/policies?type=ACCESS_POLICY" \
| jq -r '.[] | select(.system == true and .name == "Default Policy") | .id' 2>/dev/null || true)
# List apps assigned to the default policy
DEFAULT_APPS=$(okta_get "/api/v1/policies/${DEFAULT_POLICY_ID}/app" 2>/dev/null || echo "[]")
APP_COUNT=$(echo "${DEFAULT_APPS}" | jq 'length' 2>/dev/null || echo "0")
Code Pack: DB Query
-- Alert: Authentication via Default Policy (MFA bypass)
SELECT actor.displayName, client.ipAddress, outcome.result, published
FROM okta_system_log
WHERE eventType = 'policy.evaluate_sign_on'
AND debugContext.debugData.behaviors LIKE '%Default Policy%'
ORDER BY published DESC
Code Pack: Sigma Detection Rule
detection:
selection:
eventType: 'policy.evaluate_sign_on'
debugContext.debugData.policyType: 'ACCESS_POLICY'
filter_default_policy:
target.displayName|contains: 'Default Policy'
condition: selection and filter_default_policy
fields:
- actor.displayName
- client.ipAddress
- outcome.result
- published
Validation & Testing
- Run API query to list all apps assigned to the Default Policy – result should be zero applications
- Attempt login to a test application with password only – should be denied by catch-all rule
- Attempt login to a test application with password + MFA – should succeed
- Add a new test application and verify it is not automatically assigned to the Default Policy
- Review System Log for
policy.evaluate_sign_onevents referencing the Default Policy – should show no recent hits - Verify each custom policy has a catch-all deny rule as the second-to-last rule
Expected result: Zero applications assigned to the Default Policy; all authentication flows require MFA through explicit custom policies.
Monitoring & Maintenance
Log query and SIEM alert rule: See Code Pack section 1.9 (cli and db) above for log filter expressions and SIEM detection queries.
Maintenance schedule:
- Weekly: Automated script to check for apps on Default Policy (integrate into CI/CD)
- Monthly: Manual review of authentication policy assignments
- On application onboarding: Mandatory policy assignment as part of app deployment checklist
- Quarterly: Full audit of all policy rules and catch-all deny rule placement
1.10 Harden Self-Service Recovery
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | IA-5(1), IA-11 |
Description
Restrict self-service account recovery to trusted methods and network locations. Remove weak recovery options (SMS, voice call, security questions) that are susceptible to interception, SIM swapping, and social engineering. Limit recovery flows to corporate network zones to prevent account hijacking from untrusted locations.
Rationale
Why This Matters:
- Self-service password recovery is a primary account takeover vector – attackers bypass MFA by resetting credentials
- SMS-based recovery is vulnerable to SIM swapping, SS7 interception, and carrier social engineering
- Voice call recovery is susceptible to call forwarding attacks and voicemail compromise
- Security questions can be researched or socially engineered (mother’s maiden name, first pet, etc.)
- Recovery flows initiated from untrusted networks allow attackers to reset passwords remotely without triggering network-based controls
- Once an attacker resets a password, they can enroll their own MFA factors and establish persistent access
Attack Prevented: Account takeover via password recovery abuse. An attacker with access to a target’s phone number (via SIM swap) or personal information (via OSINT) initiates self-service recovery, resets the password, enrolls a new authenticator, and gains persistent access to all SSO-connected applications.
Real-World Context:
- Obsidian Security Research: Identified that recovery flows from untrusted networks are a top account hijack technique, especially when SMS or security questions are enabled as recovery options
Prerequisites
- Super Admin access
- Network zones configured (see Section 2.1)
- Corporate network zone defined with VPN egress IPs
- Okta Verify or email-based authenticator deployed to users
ClickOps Implementation
Step 1: Remove Weak Recovery Authenticators
- Navigate to: Security → Authenticators
- Review the list of active authenticators
- For Phone (SMS/Voice):
- Click Actions → Edit
- Under Used for, uncheck Recovery (leave Authentication if still needed for non-admin users)
- If SMS/Voice is not needed at all, click Actions → Deactivate
- For Security Question:
- Click Actions → Deactivate
- Confirm deactivation
- Note: Existing enrolled security questions will be removed from user accounts
Step 2: Configure Password Recovery Settings
- Navigate to: Security → Authenticators
- Click Actions next to Password → Select Edit
- For each Password Policy listed, click Edit:
- Locate the Account Recovery section
- Recovery authenticators: Ensure only Email and Okta Verify are selected
- Phone (SMS/Voice call): Uncheck / remove
- Security question: Uncheck / remove
- Click Save for each policy
Step 3: Restrict Recovery to Corporate Network Zones
- Navigate to: Security → Authentication Policies
- Select your primary authentication policy (or create a new one for recovery)
- Click Add Rule:
- Name: “Block Recovery from Untrusted Networks”
- IF: Network zone is NOT “Corporate Network” (or your defined trusted zone)
- AND: User is attempting self-service recovery
- THEN: Access is Denied
- Position this rule above your general allow rules
- Click Save
Step 4: Configure Authenticator Enrollment Policy
- Navigate to: Security → Authenticators → Enrollment tab
- Edit the enrollment policy:
- Okta Verify: Set to Required
- Email: Set to Required
- Phone: Set to Disabled or Optional (not for recovery)
- Security Question: Set to Disabled
- Click Save
Step 5: Test Recovery Flow
- From a corporate network IP, initiate a test password recovery
- Verify only email and authenticator-based options are presented
- From an external/untrusted IP, attempt recovery – verify it is blocked or requires step-up
Time to Complete: ~30 minutes
Code Implementation
Code Pack: Terraform
# Deactivate security question authenticator
resource "okta_authenticator" "security_question" {
name = "Security Question"
key = "security_question"
status = "INACTIVE"
}
# Configure phone authenticator -- remove recovery usage, keep for auth only
resource "okta_authenticator" "phone" {
name = "Phone"
key = "phone_number"
status = "ACTIVE"
settings = jsonencode({
allowedFor = "authentication"
})
}
# Password policy with hardened recovery settings
resource "okta_policy_password" "hardened_recovery" {
name = "Hardened Password Policy"
status = "ACTIVE"
description = "Password policy with restricted recovery methods"
priority = 1
password_min_length = var.password_min_length
password_min_lowercase = 1
password_min_uppercase = 1
password_min_number = 1
password_min_symbol = 1
password_max_age_days = var.password_max_age_days
password_min_age_minutes = 1440
password_history_count = var.password_history_count
recovery_email_token = 1
email_recovery = "ACTIVE"
sms_recovery = "INACTIVE"
call_recovery = "INACTIVE"
question_recovery = "INACTIVE"
groups_included = [var.everyone_group_id]
}
Code Pack: API Script
okta_put "/api/v1/policies/${POLICY_ID}" '{
"settings": {
"recovery": {
"factors": {
"okta_email": {
"status": "ACTIVE",
"properties": {
"recoveryToken": {
"tokenLifetimeMinutes": 10
}
}
},
"okta_sms": {
"status": "INACTIVE"
},
"okta_call": {
"status": "INACTIVE"
},
"recovery_question": {
"status": "INACTIVE"
}
}
}
}
}' > /dev/null 2>&1 && {
updated=$((updated + 1))
} || warn "1.10 Failed to update recovery for policy '${POLICY_NAME}'"
# Step 2: Deactivate Security Question authenticator
info "1.10 Deactivating Security Question authenticator..."
SECURITY_QUESTION_ID=$(okta_get "/api/v1/authenticators" \
| jq -r '.[] | select(.key == "security_question") | .id' 2>/dev/null || true)
if [ -n "${SECURITY_QUESTION_ID}" ]; then
okta_post "/api/v1/authenticators/${SECURITY_QUESTION_ID}/lifecycle/deactivate" '{}' > /dev/null 2>&1 \
&& info "1.10 Security Question authenticator deactivated" \
|| warn "1.10 Security Question may already be inactive"
fi
# Step 3: Update Phone authenticator to remove recovery usage
info "1.10 Removing Phone authenticator from recovery..."
PHONE_ID=$(okta_get "/api/v1/authenticators" \
| jq -r '.[] | select(.key == "phone_number") | .id' 2>/dev/null || true)
if [ -n "${PHONE_ID}" ]; then
okta_put "/api/v1/authenticators/${PHONE_ID}" '{
"name": "Phone",
"settings": {
"allowedFor": "authentication"
}
}' > /dev/null 2>&1 \
&& info "1.10 Phone authenticator restricted to authentication only" \
|| warn "1.10 Failed to update phone authenticator"
fi
Code Pack: DB Query
-- Alert: Password recovery from non-corporate IP
SELECT actor.displayName, client.ipAddress, client.geographicalContext.city,
client.geographicalContext.country, outcome.result, published
FROM okta_system_log
WHERE eventType IN ('user.account.reset_password', 'user.credential.forgot_password')
AND client.ipAddress NOT IN (SELECT ip FROM corporate_ip_ranges)
ORDER BY published DESC
-- Alert: SMS/Voice recovery attempt (should not occur after hardening)
SELECT actor.displayName, client.ipAddress, outcome.result, published
FROM okta_system_log
WHERE eventType = 'user.account.reset_password'
AND debugContext.debugData.factor IN ('SMS', 'CALL', 'QUESTION')
ORDER BY published DESC
Code Pack: Sigma Detection Rules (2)
detection:
selection:
eventType: 'user.account.reset_password'
debugContext.debugData.factor:
- 'SMS'
- 'CALL'
- 'QUESTION'
condition: selection
fields:
- actor.displayName
- client.ipAddress
- outcome.result
- published
detection:
selection:
eventType:
- 'user.account.reset_password'
- 'user.credential.forgot_password'
securityContext.isProxy: true
condition: selection
fields:
- actor.displayName
- client.ipAddress
- client.geographicalContext.city
- client.geographicalContext.country
- outcome.result
- published
Validation & Testing
- Navigate to Security → Authenticators and verify Security Question shows Inactive
- Navigate to Security → Authenticators → Password → Edit and verify SMS, Voice, and Security Question are disabled for recovery
- Initiate a password reset from a corporate network IP – verify only Email and Okta Verify options appear
- Initiate a password reset from an external/untrusted IP – verify the request is blocked or requires additional verification
- Attempt to enroll a security question as a user – should not be available
- Review System Log for
user.account.reset_passwordevents and verify they originate only from trusted network zones - Verify recovery token lifetime is set to 10 minutes or less
Expected result: Self-service recovery limited to email and authenticator-based methods; no SMS, voice, or security question options; recovery blocked from untrusted networks.
Monitoring & Maintenance
Log query and SIEM alert rules: See Code Pack section 1.10 (cli and db) above for log filter expressions and SIEM detection queries.
Maintenance schedule:
- Monthly: Verify authenticator enrollment policy still disables weak recovery options
- Quarterly: Audit recovery events in System Log for anomalies
- On policy changes: Re-verify that recovery restrictions remain in place after any authenticator or policy modifications
- Annually: Review recovery methods against current threat landscape (new attack techniques against remaining methods)
1.11 Enable End-User Security Notifications
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | SI-4, IR-6 |
Description
Enable all five end-user security notification types in Okta so that users receive immediate alerts when security-relevant changes occur on their accounts. Additionally enable Suspicious Activity Reporting to allow users to flag unauthorized actions directly from notification emails, creating actionable system log events for security teams.
Rationale
Why This Matters:
- End users are often the first to notice unauthorized access to their accounts – a notification about an unrecognized sign-on or authenticator change prompts immediate reporting
- Without notifications, an attacker who compromises an account can operate undetected for days or weeks while enrolling new factors, changing passwords, and accessing applications
- Authenticator enrolled/reset notifications detect a critical persistence technique: attackers who gain temporary access immediately register their own MFA factors to maintain access after the initial vector is closed
- Suspicious Activity Reporting turns every user into a sensor – when a user clicks “Report Suspicious Activity” in a notification email, Okta generates a
user.account.report_suspicious_activity_by_endusersystem log event that SIEM can automatically escalate - These notifications cost nothing to enable and provide significant detection value with no user friction
Attack Prevented: Undetected account takeover and persistence. An attacker who compromises credentials and enrolls a new authenticator will trigger an “authenticator enrolled” notification to the legitimate user, who can immediately report the unauthorized change before the attacker establishes persistent access.
Real-World Context:
- Okta HealthInsight: Flags missing end-user notifications as a security gap in tenant health assessments
- Obsidian Security Research: Recommends all five notification types as a low-effort, high-value detection control
ClickOps Implementation
Step 1: Enable End-User Notification Types
- Navigate to: Settings → Account
- Scroll to the End-User Notifications section
- Enable all five notification types:
| Notification | Description | Enable |
|---|---|---|
| New sign-on notification | Alerts users when a sign-on occurs from an unrecognized device or browser | Yes |
| Authenticator enrolled notification | Alerts users when a new authenticator (MFA factor) is registered to their account | Yes |
| Authenticator reset notification | Alerts users when an authenticator is removed or reset on their account | Yes |
| Password changed notification | Alerts users when their password is changed | Yes |
| MFA factor reset notification | Alerts users when an MFA factor is reset by an administrator | Yes |
- Click Save
Step 2: Enable Suspicious Activity Reporting
- Navigate to: Security → General
- Scroll to the Suspicious Activity Reporting section
- Set to Enabled
- Click Save
- When enabled, notification emails include a “Report Suspicious Activity” button
- User clicks generate a system log event:
user.account.report_suspicious_activity_by_enduser
Step 3: Verify Notification Delivery
- Using a test user account, perform a sign-on from a new browser or device
- Verify the test user receives a “New sign-on” notification email
- Verify the email contains the “Report Suspicious Activity” button (if Suspicious Activity Reporting is enabled)
- Click “Report Suspicious Activity” and verify the system log event is created
Step 4: Configure SIEM Alerting for Suspicious Activity Reports
- In your SIEM, create a high-priority alert for the event type
user.account.report_suspicious_activity_by_enduser - This event should trigger an immediate incident response workflow
- Correlate with recent authentication and factor enrollment events for the reporting user
Time to Complete: ~15 minutes
Code Implementation
Code Pack: Terraform
# Org-level configuration for end-user support
resource "okta_org_configuration" "notifications" {
end_user_support_help_url = var.support_url
# End-user notification settings are managed via the org settings API.
# Use the provisioners below for full control.
}
# Enable Suspicious Activity Reporting via API call
# (Not all org-level settings are natively supported in Terraform)
resource "null_resource" "enable_suspicious_activity_reporting" {
provisioner "local-exec" {
command = <<-EOT
curl -s -X POST "https://${var.okta_domain}/api/v1/org/privacy/suspicious-activity-reporting" \
-H "Authorization: SSWS ${var.okta_api_token}" \
-H "Content-Type: application/json" \
-d '{"enabled": true}'
EOT
}
triggers = {
always_run = timestamp()
}
}
# Enable all end-user notification types via API call
resource "null_resource" "enable_end_user_notifications" {
provisioner "local-exec" {
command = <<-EOT
curl -s -X PUT "https://${var.okta_domain}/api/v1/org/settings" \
-H "Authorization: SSWS ${var.okta_api_token}" \
-H "Content-Type: application/json" \
-d '{
"endUserNotifications": {
"newSignOnNotification": {"enabled": true},
"authenticatorEnrolledNotification": {"enabled": true},
"authenticatorResetNotification": {"enabled": true},
"passwordChangedNotification": {"enabled": true},
"factorResetNotification": {"enabled": true}
}
}'
EOT
}
triggers = {
always_run = timestamp()
}
}
Code Pack: API Script
# Enable all five end-user notification types
info "1.11 Enabling all five notification types..."
okta_put "/api/v1/org/settings" '{
"endUserNotifications": {
"newSignOnNotification": {
"enabled": true
},
"authenticatorEnrolledNotification": {
"enabled": true
},
"authenticatorResetNotification": {
"enabled": true
},
"passwordChangedNotification": {
"enabled": true
},
"factorResetNotification": {
"enabled": true
}
}
}' > /dev/null 2>&1 && {
pass "1.11 All five end-user notification types enabled"
} || {
fail "1.11 Failed to enable end-user notifications"
increment_failed
summary
exit 0
}
# Enable Suspicious Activity Reporting
info "1.11 Enabling Suspicious Activity Reporting..."
okta_post "/api/v1/org/privacy/suspicious-activity-reporting" '{
"enabled": true
}' > /dev/null 2>&1 && {
pass "1.11 Suspicious Activity Reporting enabled"
} || {
warn "1.11 Suspicious Activity Reporting may already be enabled"
}
Code Pack: DB Query
-- HIGH PRIORITY: User reported suspicious activity
SELECT actor.displayName, actor.alternateId, client.ipAddress,
client.geographicalContext.city, client.geographicalContext.country,
outcome.result, published
FROM okta_system_log
WHERE eventType = 'user.account.report_suspicious_activity_by_enduser'
ORDER BY published DESC
-- MEDIUM PRIORITY: Authenticator enrolled from unrecognized location
-- (Correlate with new sign-on notifications)
SELECT actor.displayName, target.displayName AS authenticator_type,
client.ipAddress, client.userAgent.rawUserAgent, published
FROM okta_system_log
WHERE eventType IN (
'user.mfa.factor.activate',
'user.mfa.factor.enroll',
'system.mfa.factor.activate'
)
ORDER BY published DESC
Code Pack: Sigma Detection Rules (2)
detection:
selection:
eventType:
- 'user.mfa.factor.activate'
- 'user.mfa.factor.enroll'
- 'system.mfa.factor.activate'
- 'user.account.update_password'
condition: selection
fields:
- actor.displayName
- target.displayName
- client.ipAddress
- client.userAgent.rawUserAgent
- published
detection:
selection:
eventType: 'user.account.report_suspicious_activity_by_enduser'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- client.ipAddress
- client.geographicalContext.city
- client.geographicalContext.country
- outcome.result
- published
Validation & Testing
- Navigate to Settings → Account → End-User Notifications and verify all five notification types are Enabled
- Navigate to Security → General → Suspicious Activity Reporting and verify it is Enabled
- Sign in with a test user from a new device/browser – verify “New sign-on” email is received
- Enroll a new authenticator for a test user – verify “Authenticator enrolled” email is received
- Reset an authenticator for a test user – verify “Authenticator reset” email is received
- Change a test user’s password – verify “Password changed” email is received
- In a notification email, click “Report Suspicious Activity” – verify the system log event
user.account.report_suspicious_activity_by_enduseris created - Verify SIEM alert fires for the suspicious activity report event
Expected result: All five notification types active; users receive timely emails for security-relevant account changes; suspicious activity reports generate system log events that trigger SIEM alerts.
Monitoring & Maintenance
Log queries and SIEM alert rules: See Code Pack section 1.11 (cli and db) above for log filter expressions and SIEM detection queries.
Incident response workflow for suspicious activity reports:
- SIEM receives
user.account.report_suspicious_activity_by_enduserevent - Automatically create incident ticket with HIGH priority
- Pull last 24 hours of authentication and factor events for the reporting user
- Check for: new factor enrollments, password changes, sign-ons from unusual locations
- If compromise indicators found: suspend user session, force re-authentication, reset factors
Maintenance schedule:
- Monthly: Review suspicious activity report volume and response times
- Quarterly: Verify all five notification types are still enabled (configuration drift check)
- Quarterly: Test notification delivery by performing a controlled sign-on from a new device
- Annually: Review notification types against Okta feature updates (new notification types may be added)
2. Network Access Controls
2.1 Configure IP Zones and Network Policies
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 13.3 |
| NIST 800-53 | AC-3, SC-7 |
Description
Define network zones (corporate, VPN, known bad) and enforce authentication policies based on network location. Block or require step-up authentication from untrusted networks.
Rationale
Why This Matters:
- Attackers often operate from non-corporate infrastructure
- IP-based policies add defense layer even if credentials stolen
- Enables geographic restrictions for compliance
Attack Prevented: Credential stuffing from botnets, unauthorized access from foreign locations
ClickOps Implementation
Step 1: Define Network Zones
- Navigate to: Security → Networks
- Create zones:
Corporate Network:
- Type: IP Zone
- IPs: Your office CIDR ranges
- Gateway IPs: VPN egress IPs
Blocked Locations:
- Type: Dynamic Zone
- Block: TOR exit nodes, known-bad IP ranges
- Use threat intelligence feeds
Step 2: Create Zone-Based Authentication Policy
- Navigate to: Security → Authentication Policies
- Add rule:
- IF: Network zone = “Not Corporate”
- THEN: Require MFA + limit session duration
- Add rule:
- IF: Network zone = “Blocked Locations”
- THEN: Deny access
Code Implementation
Code Pack: Terraform
# Corporate network zone with configurable CIDRs
resource "okta_network_zone" "corporate" {
count = length(var.corporate_gateway_cidrs) > 0 ? 1 : 0
name = "Corporate Network"
type = "IP"
status = "ACTIVE"
gateways = var.corporate_gateway_cidrs
}
# IP blocklist zone
resource "okta_network_zone" "blocklist" {
count = length(var.blocked_ip_cidrs) > 0 ? 1 : 0
name = "Blocked IPs"
type = "IP"
status = "ACTIVE"
usage = "BLOCKLIST"
gateways = var.blocked_ip_cidrs
}
Code Pack: API Script
# Create Corporate Network zone
# NOTE: Replace gateway CIDRs with your actual corporate IP ranges
info "2.1 Creating Corporate Network zone..."
ZONE_RESPONSE=$(okta_post "/api/v1/zones" '{
"type": "IP",
"name": "Corporate Network",
"status": "ACTIVE",
"gateways": [
{"type": "CIDR", "value": "203.0.113.0/24"},
{"type": "CIDR", "value": "198.51.100.0/24"}
]
}' 2>/dev/null) && {
ZONE_ID=$(echo "${ZONE_RESPONSE}" | jq -r '.id' 2>/dev/null || true)
pass "2.1 Corporate Network zone created (ID: ${ZONE_ID})"
warn "2.1 IMPORTANT: Update the zone with your actual corporate IP ranges"
} || {
fail "2.1 Failed to create Corporate Network zone"
}
info "2.1 Creating TOR/Anonymizer block zone..."
okta_post "/api/v1/zones" '{
"type": "DYNAMIC_V2",
"name": "Blocked - TOR and Anonymizers",
"status": "ACTIVE",
"proxyType": "TorAnonymizer",
"usage": "BLOCKLIST"
}' > /dev/null 2>&1 && {
pass "2.1 TOR/Anonymizer block zone created"
} || {
warn "2.1 Failed to create TOR block zone (may require Adaptive MFA license)"
}
2.2 Restrict Admin Console Access by IP
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | AC-3(7) |
Description
Limit access to the Okta Admin Console to specific IP ranges (corporate network, VPN, security team IPs).
ClickOps Implementation
- Navigate to: Security → General
- Under Okta Admin Console, configure:
- Allowed IPs: Add corporate network ranges
- Block all other IPs: Enable
- Test access from allowed IP before enforcement
Warning: Ensure break-glass procedure for lockout scenarios.
2.3 Configure Dynamic Network Zones and Anonymizer Blocking
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | SC-7, AC-3 |
Description
Activate Okta’s Enhanced Dynamic Zone to automatically block traffic from anonymizing proxies, Tor exit nodes, and residential proxies. The DefaultEnhancedDynamicZone ships inactive by default and must be explicitly activated.
Rationale
Why This Matters:
- Attackers use anonymizing proxies, Tor, and VPNs to hide their origin during credential stuffing and session replay attacks
- Okta’s Enhanced Dynamic Zones leverage IP intelligence to categorize traffic sources automatically
- The default zone exists but is INACTIVE — many organizations don’t know it’s available
- Blocking anonymizers reduces attack surface without impacting legitimate users
Attack Prevented: Credential stuffing via anonymized infrastructure, session replay from Tor/proxy networks
ClickOps Implementation
Step 1: Activate Enhanced Dynamic Zone
- Navigate to: Security → Networks
- Locate DefaultEnhancedDynamicZone in the zone list
- Click Edit
- Change Zone Status to Active
- Set Usage to Blocklist
- Click Save
Step 2: Configure Blocked IP Categories
- In the Enhanced Dynamic Zone settings, select categories to block:
- Anonymizing Proxies: ☑ Checked
- Tor Exit Nodes: ☑ Checked
- Residential Proxies: ☑ Checked (optional, may impact remote workers using ISP proxies)
- Click Save
Step 3: Apply to Authentication Policies
- Navigate to: Security → Authentication Policies
- For each policy, add a rule:
- IF: Network zone = “DefaultEnhancedDynamicZone”
- THEN: Deny access
- Position this rule with higher priority than allow rules
Step 4: Configure Geographic Restrictions (Optional)
- Navigate to: Security → Networks
- Click Add Zone → Dynamic Zone
- Configure:
- Name: “Blocked Countries”
- Locations: Select countries where your organization has no users
- Usage: Blocklist
- Add deny rule in authentication policies for this zone
Code Implementation
Code Pack: Terraform
# Block anonymizing proxies and Tor exit nodes
resource "okta_network_zone" "block_anonymizers" {
count = var.profile_level >= 2 ? 1 : 0
name = "Block Anonymizers"
type = "DYNAMIC_V2"
status = "ACTIVE"
usage = "BLOCKLIST"
dynamic_proxy_type = "TorAnonymizer"
}
# Block traffic from high-risk countries
resource "okta_network_zone" "block_countries" {
count = var.profile_level >= 2 ? 1 : 0
name = "Blocked Countries"
type = "DYNAMIC"
status = "ACTIVE"
usage = "BLOCKLIST"
dynamic_locations = var.blocked_countries
}
Code Pack: API Script
# Activate the zone as a blocklist
info "2.3 Activating DefaultEnhancedDynamicZone as blocklist..."
okta_put "/api/v1/zones/${ZONE_ID}" '{
"type": "DYNAMIC_V2",
"name": "DefaultEnhancedDynamicZone",
"status": "ACTIVE",
"usage": "BLOCKLIST",
"proxyType": "TorAnonymizer"
}' > /dev/null 2>&1 && {
pass "2.3 Enhanced Dynamic Zone activated with anonymizer blocking"
increment_applied
} || {
fail "2.3 Failed to activate Enhanced Dynamic Zone"
increment_failed
}
Code Pack: Sigma Detection Rule
detection:
selection:
eventType: 'security.threat.detected'
debugContext.debugData.threatSuspected: 'ANONYMIZER'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- client.ipAddress
- debugContext.debugData.threatSuspected
- outcome.result
- published
Validation & Testing
- Navigate to Security → Networks and verify DefaultEnhancedDynamicZone shows Active status
- Verify zone usage is set to Blocklist
- Test access from a Tor exit node or known anonymizing proxy — should be denied
- Verify legitimate users on corporate VPN are not affected
Monitoring & Maintenance
Log query: See Code Pack section 2.3 (cli) above for the System Log filter expression.
Maintenance schedule:
- Monthly: Review blocked traffic patterns for false positives
- Quarterly: Update geographic restrictions based on business expansion
3. OAuth & Integration Security
3.1 Implement OAuth App Consent Policies
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.2 |
| NIST 800-53 | AC-6, CM-7 |
Description
Control which OAuth applications users can authorize and require admin approval for new app integrations. Prevent shadow IT through unconsented OAuth grants.
Rationale
Why This Matters:
- Okta’s 7,000+ integrations create massive attack surface
- Malicious apps can request broad OAuth scopes
- Unconsented apps bypass security review
Attack Prevented: OAuth phishing, malicious app consent, shadow IT
ClickOps Implementation
Step 1: Configure App Integration Policies
- Navigate to: Applications → App Integration Policies
- Create policy:
- Name: “Require Admin Approval for New Apps”
- Scope: All users except Admins
- Action: Require admin approval for user-initiated apps
Step 2: Review Existing App Grants
- Navigate to: Reports → Application Access Audit
- Export list of all OAuth grants
- Review for over-permissioned or suspicious apps
- Revoke unnecessary grants
Step 3: Restrict API Token Creation
- Navigate to: Security → API → Tokens
- Review existing tokens
- Configure:
- Require admin approval for new tokens
- Set expiration policies (max 90 days)
Code Implementation
Code Pack: API Script
# List all active applications with OAuth/OIDC sign-on
info "3.1 Listing active applications..."
ACTIVE_APPS=$(okta_get "/api/v1/apps?filter=status%20eq%20%22ACTIVE%22&limit=200") || {
fail "3.1 Failed to list active applications"
increment_failed
summary
exit 0
}
TOTAL_COUNT=$(echo "${ACTIVE_APPS}" | jq 'length' 2>/dev/null || echo "0")
OAUTH_APPS=$(echo "${ACTIVE_APPS}" | jq '[.[] | select(.signOnMode == "OPENID_CONNECT" or .signOnMode == "OAUTH_2_0")]' 2>/dev/null || echo "[]")
OAUTH_COUNT=$(echo "${OAUTH_APPS}" | jq 'length' 2>/dev/null || echo "0")
info "3.1 Total active apps: ${TOTAL_COUNT}, OAuth/OIDC apps: ${OAUTH_COUNT}"
echo "${OAUTH_APPS}" | jq -r '.[] | " - \(.label // .name) (mode: \(.signOnMode), created: \(.created))"' 2>/dev/null || true
# Audit OAuth token clients on default authorization server
info "3.1 Auditing OAuth clients on default authorization server..."
AUTH_CLIENTS=$(okta_get "/api/v1/authorizationServers/default/clients" 2>/dev/null || echo "[]")
CLIENT_COUNT=$(echo "${AUTH_CLIENTS}" | jq 'length' 2>/dev/null || echo "0")
if [ "${CLIENT_COUNT}" -gt 0 ]; then
info "3.1 Found ${CLIENT_COUNT} OAuth client(s) on default auth server"
echo "${AUTH_CLIENTS}" | jq -r '.[] | " - \(.client_name // "unnamed") (ID: \(.client_id))"' 2>/dev/null || true
else
info "3.1 No OAuth clients on default authorization server"
fi
3.2 Harden SCIM Provisioning Connectors
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | AC-2, IA-4 |
Description
Secure SCIM (System for Cross-domain Identity Management) connectors that provision/deprovision users to downstream applications. SCIM tokens enable identity manipulation across connected apps.
Rationale
Why This Matters:
- SCIM connectors create/delete users in downstream apps
- Compromised SCIM tokens enable backdoor account creation
- Unlimited token validity creates persistent risk
Attack Scenario: Attacker steals SCIM token, creates backdoor accounts in connected SaaS apps
ClickOps Implementation
Step 1: Audit SCIM-Enabled Apps
- Navigate to: Applications → Applications
- Filter by: Provisioning = Enabled
- Document all SCIM integrations
Step 2: Rotate SCIM Tokens
- For each SCIM-enabled app:
- Navigate to app → Provisioning tab
- Regenerate API token
- Update receiving application
- Document token rotation schedule (quarterly minimum)
Step 3: Limit SCIM Scope
- Configure provisioning to sync only required attributes
- Disable “Sync Password” unless required
- Enable “Group Push” only for necessary groups
Monitoring
Code Pack: Sigma Detection Rule
detection:
selection:
eventType:
- 'system.scim.user.create'
- 'system.scim.user.update'
condition: selection
fields:
- actor.displayName
- target.displayName
- target.type
- eventType
- client.ipAddress
- published
3.3 Implement OAuth Application Allowlisting
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | CM-7, AC-6 |
Description
Restrict which third-party applications can receive OAuth grants from users. OAuth consent phishing is a growing attack vector where malicious applications request broad scopes to access organizational data through user consent flows.
Rationale
Why This Matters:
- Over-privileged OAuth tokens from third-party integrations enable supply chain attacks
- Users can unknowingly grant broad access to malicious applications via consent phishing
- SaaS-to-SaaS connections create hidden trust relationships that bypass traditional security controls
- Unsanctioned apps with broad OAuth scopes create persistent backdoors
Attack Prevented: OAuth consent phishing, supply chain compromise via over-privileged integrations, shadow IT
ClickOps Implementation
Step 1: Review Existing OAuth Grants
- Navigate to: Applications → Applications
- Filter by: Sign-on method = OpenID Connect or OAuth 2.0
- For each application, click Okta API Scopes tab
- Document all granted scopes — flag any with
okta.users.manage,okta.apps.manage, orokta.authorizationServers.manage
Step 2: Configure App Integration Policies
- Navigate to: Settings → Account → App Integration Settings
- Under User app requests:
- Select Require admin approval for user-initiated app integrations
- Under Third-party app consent:
- Select Only allow pre-approved applications
- Click Save
Step 3: Audit API Scopes for Each Application
- Navigate to: Security → API → Authorization Servers
- Select the default authorization server
- Click Scopes tab — review all custom scopes
- Click Access Policies tab — verify policies restrict token issuance to approved clients
Step 4: Create Regular Grant Review Process
- Export OAuth grant report monthly
- Revoke grants for applications no longer in use
- Alert on new OAuth consent events
Code Implementation
Code Pack: API Script
# List all active OIDC/OAuth apps
ACTIVE_APPS=$(okta_get "/api/v1/apps?filter=status%20eq%20%22ACTIVE%22&limit=200" 2>/dev/null || echo "[]")
APP_IDS=$(echo "${ACTIVE_APPS}" | jq -r '.[] | select(.signOnMode == "OPENID_CONNECT" or .signOnMode == "OAUTH_2_0") | .id' 2>/dev/null || true)
GRANTS=$(okta_get "/api/v1/apps/${APP_ID}/grants" 2>/dev/null || echo "[]")
BROAD_SCOPES=$(echo "${GRANTS}" | jq -r '.[] | select(.scopeId | test("manage|write"; "i")) | .scopeId' 2>/dev/null || true)
# List OAuth clients on default authorization server
info "3.3 Auditing default authorization server clients..."
okta_get "/api/v1/authorizationServers/default/clients" 2>/dev/null \
| jq -r '.[] | " - \(.client_name // "unnamed") (ID: \(.client_id))"' 2>/dev/null || true
Code Pack: Sigma Detection Rule
detection:
selection:
eventType:
- 'app.oauth2.consent.grant'
- 'app.oauth2.as.consent.grant'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- target.displayName
- debugContext.debugData.requestedScopes
- client.ipAddress
- published
Validation & Testing
- Verify admin approval is required for new app integrations
- Attempt to add an unauthorized OAuth application as a standard user — should require admin approval
- Confirm no applications have overly broad scopes (
*.manage,*.write) unless justified
Monitoring & Maintenance
Log query: See Code Pack section 3.3 (cli) above for the System Log filter expression.
Maintenance schedule:
- Monthly: Review OAuth consent grants across all users
- Quarterly: Audit application scopes and remove excessive permissions
- On new integration: Require security review before OAuth grant approval
3.4 Govern Non-Human Identities (NHI)
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | IA-4, IA-5, AC-2 |
| DISA STIG | v1.1 NHI Controls (Feb 2026) |
Description
Implement governance for non-human identities: service accounts, API tokens, automation accounts, and machine-to-machine (M2M) integrations. Migrate from static SSWS API tokens to OAuth 2.0 for API access. NHI compromise is a leading cause of identity-based breaches and is now covered by DISA STIG v1.1.
Rationale
Why This Matters:
- The October 2023 Okta breach was caused by a compromised service account whose credentials were saved to a personal Google profile
- Static SSWS API tokens never expire unless manually revoked, creating persistent access risk
- Service accounts tied to individual admin users become orphaned when that admin leaves
- OAuth 2.0 provides shorter token lifespans, granular scopes, and automatic key rotation vs static SSWS
- DISA STIG v1.1 (Feb 2026) adds five new checks specifically for NHI security
Attack Prevented: Service account compromise, API token theft and replay, persistent unauthorized access via stale tokens
Real-World Incidents:
- October 2023: Compromised service account credentials stored in personal Google profile enabled breach of Okta support system
ClickOps Implementation
Step 1: Audit All API Tokens
- Navigate to: Security → API → Tokens
- Document all active tokens:
- Token name and purpose
- Created by (which admin)
- Created date
- Last used date
- Network restrictions (if any)
- Flag tokens with no activity in 90+ days for deactivation
- Flag tokens created by users who are no longer active
Step 2: Add IP Restrictions to Existing SSWS Tokens
- For each active SSWS token:
- Navigate to: Security → API → Tokens
- Click the token name
- Under Network, select a specific network zone (e.g., “Corporate Network” or “Automation Servers”)
- Click Save
- This limits where stolen tokens can be replayed from
Step 3: Create OAuth 2.0 Service Apps (Migration)
- Navigate to: Applications → Applications
- Click Create App Integration
- Select API Services → Next
- Configure:
- App integration name: “[Service Name] API Access”
- Grant type: Client Credentials
- Client authentication: Public key / Private key (recommended) or Client secret
- Under Okta API Scopes, grant ONLY the minimum required scopes
- Click Save
- Configure token lifetime: Security → API → Authorization Servers → default → Access Policies
Step 4: Create Dedicated Service Accounts
- Navigate to: Directory → People
- Click Add Person
- Create a dedicated service account:
- First name: “SVC”
- Last name: “[Service Name]”
- Username: “svc-[service]@yourdomain.com”
- User type: Set to a custom “Service Account” type if available
- Assign minimum-required admin role (custom role preferred over built-in)
- Never use personal admin accounts for service/automation purposes
Step 5: Establish Token Rotation Policy
- Document token rotation schedule:
- SSWS tokens (legacy): Rotate every 90 days maximum
- OAuth 2.0 client secrets: Rotate every 180 days
- OAuth 2.0 private keys: Rotate annually
- Set calendar reminders for rotation dates
- Include token rotation in operational runbooks
Code Implementation
Code Pack: Terraform
# OAuth 2.0 service app using client_credentials with private_key_jwt
resource "okta_app_oauth" "service_automation" {
label = "SVC - Automation API Access"
type = "service"
grant_types = ["client_credentials"]
response_types = ["token"]
token_endpoint_auth_method = "private_key_jwt"
pkce_required = false
jwks {
kty = "RSA"
e = var.service_app_public_key_e
n = var.service_app_public_key_n
}
}
# Grant minimum-required API scopes to the service app
resource "okta_app_oauth_api_scope" "users_read" {
app_id = okta_app_oauth.service_automation.id
issuer = "https://${var.okta_domain}"
scopes = ["okta.users.read"]
}
Code Pack: API Script
# List all active API tokens
info "3.4 Listing all active API tokens..."
API_TOKENS=$(okta_get "/api/v1/api-tokens" 2>/dev/null || echo "[]")
TOKEN_COUNT=$(echo "${API_TOKENS}" | jq 'length' 2>/dev/null || echo "0")
# List service applications (OAuth client_credentials)
info "3.4 Listing OAuth service applications..."
SERVICE_APPS=$(okta_get "/api/v1/apps?filter=status%20eq%20%22ACTIVE%22&limit=200" 2>/dev/null \
| jq '[.[] | select(.settings.oauthClient.grant_types? // [] | index("client_credentials"))]' 2>/dev/null || echo "[]")
SVC_COUNT=$(echo "${SERVICE_APPS}" | jq 'length' 2>/dev/null || echo "0")
Code Pack: Sigma Detection Rule
detection:
selection:
eventType:
- 'system.api_token.create'
- 'system.api_token.revoke'
- 'app.oauth2.token.grant'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- eventType
- target.displayName
- client.ipAddress
- published
SSWS to OAuth 2.0 Migration Checklist
- Inventory all active SSWS tokens and their consumers
- Create OAuth 2.0 service app for each integration
- Generate and distribute private keys to consuming services
- Update consuming services to use OAuth 2.0 client credentials flow
- Test each integration with OAuth 2.0 tokens
- Add IP restrictions to SSWS tokens during transition (as fallback)
- Revoke SSWS tokens after successful migration verification
- Document new OAuth 2.0 credentials and rotation schedule
Validation & Testing
- Verify all API tokens have network restrictions applied
- Confirm no tokens are older than 90 days without documented exception
- Test OAuth 2.0 service app authentication using client credentials flow
- Verify no SSWS tokens are assigned to personal admin accounts used by humans
Monitoring & Maintenance
Log query: See Code Pack section 3.4 (cli) above for the System Log filter expression.
Maintenance schedule:
- Monthly: Review API token usage (flag tokens with no recent activity)
- Quarterly: Rotate SSWS tokens and OAuth 2.0 client secrets
- On employee departure: Audit and reassign any tokens created by departing admin
- Annually: Rotate OAuth 2.0 private keys
4. Session Management
4.1 Configure Session Timeouts
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | AC-12, SC-10 |
| DISA STIG | V-273186, V-273187, V-273203 |
Description
Set session timeouts appropriate to risk level. Reduce maximum session lifetime and enforce re-authentication for sensitive applications.
Rationale
Why This Matters:
- Long sessions increase window for session hijacking
- October 2023 breach exploited long-lived session cookies
- Idle timeouts reduce exposure from abandoned sessions
Specification Requirements
| Setting | L1 (Baseline) | L2 (Hardened) | L3/DISA STIG |
|---|---|---|---|
| Max session lifetime | 12 hours | 8 hours | 18 hours |
| Max idle time | 1 hour | 30 minutes | 15 minutes |
| Admin Console idle time | 30 minutes | 15 minutes | 15 minutes |
| Persistent sessions | Optional | Disabled | Disabled |
ClickOps Implementation
Step 1: Configure Global Session Policy
- Navigate to: Security → Global Session Policy
- Select the Default Policy
- Click Add rule (create a custom rule at Priority 1, not the “Default Rule”)
- Configure settings per the specification requirements table above
Step 2: Configure Admin Console Session Timeout
- Navigate to: Applications → Applications → Okta Admin Console
- Click the Sign On tab
- Under “Okta Admin Console session”, set:
- Maximum app session idle time: 15 minutes (L2/L3)
Step 3: Create App-Specific Session Policies For sensitive apps (PAM, admin consoles, financial systems):
- Navigate to app → Sign On tab
- Configure:
- Session lifetime: 2 hours max
- Re-authentication: Required on every access
Code Pack: Terraform
# Global session policy with hardened timeout values
resource "okta_policy_signon" "session_timeouts" {
name = "Hardened Session Timeouts"
status = "ACTIVE"
description = "Session timeout configuration per HTH hardening guide"
priority = 3
}
resource "okta_policy_rule_signon" "session_timeout_rule" {
policy_id = okta_policy_signon.session_timeouts.id
name = "Enforce Session Timeouts"
status = "ACTIVE"
priority = 1
access = "ALLOW"
mfa_required = true
mfa_prompt = "SESSION"
session_lifetime = var.session_max_lifetime_minutes
session_idle = var.session_max_idle_minutes
session_persistent = false
}
Code Pack: API Script
# Get global session policies and report current settings
POLICIES=$(okta_get "/api/v1/policies?type=OKTA_SIGN_ON") || {
fail "4.1 Failed to retrieve global session policies"
increment_failed
summary
exit 0
}
POLICY_COUNT=$(echo "${POLICIES}" | jq 'length' 2>/dev/null || echo "0")
if [ "${POLICY_COUNT}" -eq 0 ]; then
warn "4.1 No global session policies found"
increment_skipped
summary
exit 0
fi
for POLICY_ID in $(echo "${POLICIES}" | jq -r '.[].id' 2>/dev/null); do
POLICY_NAME=$(echo "${POLICIES}" | jq -r ".[] | select(.id == \"${POLICY_ID}\") | .name" 2>/dev/null || echo "unknown")
info "4.1 Reviewing session policy '${POLICY_NAME}' (${POLICY_ID})..."
RULES=$(okta_get "/api/v1/policies/${POLICY_ID}/rules" 2>/dev/null || echo "[]")
RULE_COUNT=$(echo "${RULES}" | jq 'length' 2>/dev/null || echo "0")
if [ "${RULE_COUNT}" -gt 0 ]; then
echo "${RULES}" | jq -r '.[] | " - Rule: \(.name), MaxLifetime: \(.actions.signon.session.maxSessionLifetimeMinutes // "default")min, MaxIdle: \(.actions.signon.session.maxSessionIdleMinutes // "default")min, Persistent: \(.actions.signon.session.usePersistentCookie // "default")"' 2>/dev/null || true
fi
done
4.2 Disable Session Persistence
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | SC-23 |
| DISA STIG | V-273206 |
Description
Disable “Remember Me” and persistent session features that increase session hijacking risk. Persistent global session cookies allow sessions to survive browser restarts, which extends the window for session hijacking.
ClickOps Implementation
- Navigate to: Security → Global Session Policy
- Select the Default Policy
- Click Add rule (create a custom rule at Priority 1)
- Disable:
- Remember my device for MFA
- Okta global session cookies persist across browser sessions: Disabled
- Stay signed in for: Set to minimum
- Navigate to: Customizations → Other
- Disable: Allow users to remain signed in
Code Pack: Terraform
# Global signon policy that disables persistent sessions
# Prevents session cookies from surviving browser restarts
resource "okta_policy_signon" "disable_session_persistence" {
count = var.profile_level >= 2 ? 1 : 0
name = "Disable Session Persistence"
status = "ACTIVE"
description = "Disables Remember Me and persistent session cookies to reduce session hijacking risk"
priority = 2
}
# Rule enforcing non-persistent sessions with strict timeouts
resource "okta_policy_rule_signon" "no_persistent_sessions" {
count = var.profile_level >= 2 ? 1 : 0
policy_id = okta_policy_signon.disable_session_persistence[0].id
name = "No Persistent Sessions"
status = "ACTIVE"
priority = 1
access = "ALLOW"
mfa_required = true
mfa_prompt = "SESSION"
session_lifetime = 480
session_idle = 30
session_persistent = false
}
Code Pack: API Script
POLICIES=$(okta_get "/api/v1/policies?type=OKTA_SIGN_ON") || {
fail "4.2 Failed to retrieve global session policies"
increment_failed
summary
exit 0
}
persistent_found=false
for POLICY_ID in $(echo "${POLICIES}" | jq -r '.[].id' 2>/dev/null); do
RULES=$(okta_get "/api/v1/policies/${POLICY_ID}/rules" 2>/dev/null || echo "[]")
PERSISTENT=$(echo "${RULES}" | jq '[.[] | select(.actions.signon.session.usePersistentCookie == true)] | length' 2>/dev/null || echo "0")
if [ "${PERSISTENT}" -gt 0 ]; then
persistent_found=true
POLICY_NAME=$(echo "${POLICIES}" | jq -r ".[] | select(.id == \"${POLICY_ID}\") | .name" 2>/dev/null || echo "unknown")
warn "4.2 Found ${PERSISTENT} rule(s) with persistent sessions in policy '${POLICY_NAME}' (${POLICY_ID})"
fi
done
4.3 Configure Admin Session Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | SC-23, AC-12 |
Description
Harden admin sessions with ASN binding, IP binding, and Protected Actions. These controls prevent session hijacking by invalidating admin sessions when network characteristics change, and require step-up authentication before critical operations.
Rationale
Why This Matters:
- The October 2023 breach demonstrated that stolen admin session tokens can be replayed from any network
- Admin Session ASN Binding invalidates sessions when the Autonomous System Number changes (e.g., attacker replays from a different ISP)
- Admin Session IP Binding is more restrictive — invalidates on any IP change
- Protected Actions require step-up authentication before high-impact operations like creating IdPs or resetting MFA factors
- These are post-breach product enhancements specifically designed to prevent session hijacking
Attack Prevented: Admin session hijacking, stolen session token replay, unauthorized critical operations
Real-World Incidents:
- October 2023: Stolen HAR file session tokens replayed from attacker infrastructure to access admin consoles
ClickOps Implementation
Step 1: Verify Admin Session ASN Binding (Enabled by Default)
- Navigate to: Security → General
- Scroll to Admin Session Settings
- Verify Bind admin sessions to ASN is ON
- If not enabled, toggle it ON and click Save
Step 2: Enable Admin Session IP Binding (Recommended for L2+)
- Navigate to: Security → General
- Under Admin Session Settings:
- Enable Bind admin sessions to IP address
- Click Save
Note: IP binding may cause disruptions for admins on dynamic IP addresses or mobile networks. Test with a pilot group before enforcing broadly.
Step 3: Enable Protected Actions
- Navigate to: Security → General
- Scroll to Protected Actions
- Click Edit
- Enable Protected Actions and select the operations that require step-up authentication:
- ☑ Activate/deactivate identity providers
- ☑ Create/modify identity providers
- ☑ Reset user MFA factors
- ☑ Modify authentication policies
- ☑ Create/modify admin role assignments
- ☑ Modify network zones
- Set Authenticator requirement: Phishing-resistant (FIDO2/WebAuthn)
- Click Save
Step 4: Disable MFA Device Remembrance for Admin Sessions
- Navigate to: Security → Authentication Policies
- Select the Okta Admin Console policy
- Edit the active rule:
- Set MFA remember device: Disabled (require MFA every session)
- Set Re-authentication frequency: Every sign-in attempt
- Click Save
Code Implementation
Code Pack: API Script
info "4.3 Updating admin session binding settings..."
okta_put "/api/v1/org/settings" "{
\"adminSessionASNBinding\": \"${asn_target}\",
\"adminSessionIPBinding\": \"${ip_target}\"
}" > /dev/null 2>&1 && {
pass "4.3 Admin session security updated (ASN: ${asn_target}, IP: ${ip_target})"
increment_applied
} || {
fail "4.3 Failed to update admin session settings"
increment_failed
}
Code Pack: Sigma Detection Rules (2)
detection:
selection:
eventType:
- 'system.protected_action.challenge'
- 'system.protected_action.success'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- eventType
- target.displayName
- client.ipAddress
- published
detection:
selection:
eventType: 'user.session.invalidate'
filter_binding:
debugContext.debugData.reason: 'ADMIN_SESSION_BINDING'
condition: selection and filter_binding
fields:
- actor.displayName
- actor.alternateId
- client.ipAddress
- debugContext.debugData.reason
- outcome.result
- published
Validation & Testing
- Verify ASN binding is active: Navigate to Security → General → Admin Session Settings
- Verify IP binding is active (if applicable)
- Test Protected Actions: Attempt to modify an IdP — should prompt for step-up authentication
- Test session invalidation: Log in as admin, change network (e.g., switch from WiFi to VPN) — session should be invalidated if IP binding is enabled
Monitoring & Maintenance
Log queries: See Code Pack section 4.3 (cli) above for session binding and Protected Actions log filter expressions.
Maintenance schedule:
- Monthly: Review Protected Actions audit log for any failures or unusual patterns
- Quarterly: Review IP binding exceptions for admins on dynamic networks
5. Monitoring & Detection
5.1 Enable Comprehensive System Logging
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | AU-2, AU-3, AU-6 |
| DISA STIG | V-273202 (HIGH) |
Description
Configure Okta System Log forwarding to SIEM with comprehensive event capture for security monitoring and incident response.
ClickOps Implementation
Step 1: Configure Log Streaming
- Navigate to: Reports → Log Streaming
- Click Add Log Stream
- Select integration type:
- AWS EventBridge - For AWS-based SIEM solutions
- Splunk Cloud - For Splunk deployments
- Complete the required configuration fields
- Click Save and verify the connection is Active
Step 2: Alternative - Okta Log API Integration If your SIEM is not directly supported:
- Navigate to: Security → API → Tokens
- Create an API token with read-only System Log permissions
- Configure your SIEM to pull logs via the System Log API endpoint
Step 3: Create Alert Rules (via SIEM)
Code Pack: API Script
# Verify System Log API is accessible and returning events
info "5.1 Testing System Log API access..."
LOG_RESPONSE=$(okta_get "/api/v1/logs?limit=1" 2>/dev/null || echo "[]")
LOG_COUNT=$(echo "${LOG_RESPONSE}" | jq 'length' 2>/dev/null || echo "0")
# Check for log streaming integrations
info "5.1 Checking log streaming configuration..."
LOG_STREAMS=$(okta_get "/api/v1/logStreams" 2>/dev/null || echo "[]")
STREAM_COUNT=$(echo "${LOG_STREAMS}" | jq 'length' 2>/dev/null || echo "0")
Code Pack: DB Query
-- Detect impossible travel
SELECT user, sourceIp, geo_country, timestamp
FROM okta_logs
WHERE eventType = 'user.authentication.sso'
AND geo_country_change_within_1hr = true
-- Detect brute force
SELECT user, count(*) as attempts
FROM okta_logs
WHERE eventType = 'user.authentication.failed'
AND timestamp > now() - interval '5 minutes'
GROUP BY user
HAVING count(*) > 10
-- Detect admin role changes
SELECT actor, target, eventType, timestamp
FROM okta_logs
WHERE eventType LIKE 'system.role%'
OR eventType LIKE 'group.user_membership%admin%'
Code Pack: Sigma Detection Rules (3)
detection:
selection:
eventType: 'user.session.start'
outcome.result: 'FAILURE'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- client.ipAddress
- outcome.result
- outcome.reason
- published
detection:
selection:
eventType: 'user.authentication.sso'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- client.ipAddress
- client.geographicalContext.country
- client.geographicalContext.city
- published
detection:
selection:
eventType|startswith: 'system.role'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- target.displayName
- eventType
- client.ipAddress
- published
5.2 Configure ThreatInsight
Profile Level: L1 (Baseline)
Description
Enable Okta ThreatInsight to automatically block authentication from known-malicious IPs based on Okta’s threat intelligence.
ClickOps Implementation
- Navigate to: Security → General
- Under Okta ThreatInsight:
- Action: Block
- Exempt IPs: Add known testing IPs if needed
- Save
Code Pack: Terraform
# Enable ThreatInsight in block mode
resource "okta_threat_policy" "threatinsight" {
action = "block"
}
Code Pack: API Script
# Enable ThreatInsight with block action
info "5.2 Setting ThreatInsight to block mode..."
okta_post "/api/v1/threats/configuration" '{
"action": "block"
}' > /dev/null 2>&1 && {
pass "5.2 ThreatInsight set to block mode"
increment_applied
summary
exit 0
} || true
# Try PUT instead (API may vary by Okta version)
okta_put "/api/v1/threats/configuration" '{
"action": "block"
}' > /dev/null 2>&1 && {
pass "5.2 ThreatInsight set to block mode"
increment_applied
} || {
warn "5.2 Failed to configure ThreatInsight -- may require Adaptive MFA license"
warn "5.2 Configure manually: Security > General > ThreatInsight > Block"
increment_skipped
}
5.3 Enable Identity Threat Protection (ITP)
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | SI-4, RA-5 |
Description
Enable Identity Threat Protection with Okta AI for continuous post-authentication risk evaluation. Unlike traditional MFA (authentication-time only), ITP evaluates risk signals during active sessions and can automatically terminate sessions, require step-up MFA, or trigger Workflows responses in real-time.
Rationale
Why This Matters:
- Traditional authentication is a point-in-time check — once past MFA, an attacker has free access until the session expires
- ITP continuously evaluates risk signals: session anomalies, impossible travel, credential compromise intelligence
- Aligns with NIST 800-63-4’s Digital Identity Risk Management (DIRM) framework for continuous risk evaluation
- Can automatically respond to detected threats without human intervention
Attack Prevented: Session hijacking detected post-authentication, compromised credential use, anomalous session behavior
Prerequisites
- Okta Identity Threat Protection license (add-on to Okta Identity Engine)
- Super Admin access
- SIEM integration configured (to receive ITP events)
ClickOps Implementation
Step 1: Enable Identity Threat Protection
- Navigate to: Security → Identity Threat Protection
- Click Enable ITP
- Review the default risk policies
Step 2: Configure Risk Policies
- Navigate to: Security → Identity Threat Protection → Policies
- Configure response actions for each risk level:
| Risk Level | Recommended Action |
|---|---|
| Low | Log only |
| Medium | Require step-up MFA |
| High | Terminate session immediately |
| Critical | Terminate session + lock account |
- Click Save
Step 3: Configure Session Risk Evaluation
- Navigate to: Security → Authentication Policies
- Edit rules to include: Evaluate risk with ITP = Enabled
- Set re-authentication triggers based on risk score changes
Step 4: Integrate with Okta Workflows (Optional)
- Navigate to: Workflow → Flows
- Create a flow triggered by ITP Risk Event
- Configure automated response actions:
- Send Slack/Teams alert to security team
- Create ticket in ITSM
- Revoke active sessions for affected user
- Add source IP to dynamic blocklist
Monitoring & Maintenance
Code Pack: DB Query
SELECT actor.displayName, client.ipAddress, outcome.result,
debugContext.debugData.riskLevel, debugContext.debugData.riskReasons
FROM okta_system_log
WHERE eventType = 'security.threat.detected'
AND debugContext.debugData.riskLevel IN ('HIGH', 'CRITICAL')
ORDER BY published DESC
Code Pack: Sigma Detection Rule
detection:
selection_event:
eventType:
- 'security.threat.detected'
- 'security.session.risk_change'
selection_risk:
debugContext.debugData.riskLevel:
- 'HIGH'
- 'CRITICAL'
condition: selection_event and selection_risk
fields:
- actor.displayName
- client.ipAddress
- outcome.result
- debugContext.debugData.riskLevel
- debugContext.debugData.riskReasons
- published
5.4 Configure Behavior Detection Rules
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | SI-4, AC-7 |
Description
Configure Okta’s Behavior Detection to identify anomalous user behavior patterns and trigger adaptive authentication responses. Detection types include new device, new location, new IP, velocity anomalies (impossible travel), and IP reputation.
Rationale
Why This Matters:
- Behavioral analytics detect account compromise that static policies miss
- New device/location from an existing user may indicate credential theft
- Impossible travel (logging in from two distant locations within minutes) is a strong indicator of token replay
- Risk-based authentication adapts security requirements to threat level
Attack Prevented: Account takeover via stolen credentials, session replay from anomalous locations, impossible travel attacks
ClickOps Implementation
Step 1: Configure Behavior Detection Rules
- Navigate to: Security → Behavior Detection
- Review the default behavior types:
| Behavior Type | Recommended Action |
|---|---|
| New Device | Challenge with additional factor |
| New IP | Challenge with additional factor |
| New City | Challenge with additional factor |
| New State | Log only |
| New Country | Deny |
| Velocity (impossible travel) | Deny |
- Click Edit for each behavior type
- Set the Action per the table above
- Click Save
Step 2: Enable Risk Scoring in Authentication Policies
- Navigate to: Security → Authentication Policies
- Edit the primary user-facing policy
- In the rule conditions, enable:
- Risk score: Evaluate risk for each authentication request
- Configure responses:
- Low risk: Allow with current factors
- Medium risk: Challenge with additional factor
- High risk: Deny access
- Click Save
Code Implementation
Code Pack: Terraform
# Behavior detection rule for new location sign-on
resource "okta_behaviour" "new_location" {
count = var.profile_level >= 2 ? 1 : 0
name = "New Location Sign-On"
type = "ANOMALOUS_LOCATION"
status = "ACTIVE"
number_of_authentications = 3
location_granularity_type = "CITY"
}
# Behavior detection rule for new device
resource "okta_behaviour" "new_device" {
count = var.profile_level >= 2 ? 1 : 0
name = "New Device Sign-On"
type = "ANOMALOUS_DEVICE"
status = "ACTIVE"
number_of_authentications = 3
}
Code Pack: API Script
# List all configured behavior detection rules
info "5.4 Listing current behavior detection rules..."
BEHAVIORS=$(okta_get "/api/v1/behaviors" 2>/dev/null || echo "[]")
BEHAVIOR_COUNT=$(echo "${BEHAVIORS}" | jq 'length' 2>/dev/null || echo "0")
info "5.4 Creating new country detection rule..."
okta_post "/api/v1/behaviors" '{
"name": "New Country Detection",
"type": "ANOMALOUS_LOCATION",
"status": "ACTIVE",
"settings": {
"maxEventsUsedForEvaluation": 50
}
}' > /dev/null 2>&1 && {
pass "5.4 New Country Detection behavior rule created"
} || {
warn "5.4 Failed to create behavior rule (may already exist with different name)"
}
Code Pack: Sigma Detection Rule
detection:
selection:
eventType: 'security.behavior_detection.triggered'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- client.ipAddress
- client.geographicalContext.city
- client.geographicalContext.country
- debugContext.debugData.behaviors
- outcome.result
- published
Validation & Testing
- Verify all behavior detection rules are active: Security → Behavior Detection
- Test new device detection: Log in from an unrecognized browser — should trigger MFA challenge
- Review risk score evaluation: Check system log for
security.behavior_detection.triggeredevents
Monitoring & Maintenance
Log query: See Code Pack section 5.4 (cli) above for the System Log filter expression.
5.5 Monitor for Cross-Tenant Impersonation
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | SI-4, AU-6 |
Description
Monitor for cross-tenant impersonation attacks where an adversary with admin access configures a malicious Identity Provider (IdP) to impersonate any user without credentials or MFA. This is a high-impact, low-volume attack that should trigger immediate investigation.
Rationale
Why This Matters:
- An attacker with admin access can create a malicious external IdP
- They then configure routing rules to direct authentication through the malicious IdP
- This allows impersonation of ANY user without knowing their credentials or MFA
- The attack leaves traces in system logs but is difficult to detect without specific monitoring
- IdP lifecycle events are high-impact but low-volume — ideal for alerting
Attack Prevented: Cross-tenant impersonation via malicious IdP configuration, unauthorized federation trust establishment
Real-World Context:
- Obsidian Security Research: Documented this technique as a post-compromise persistence mechanism used against Okta customers
ClickOps Implementation
Step 1: Restrict IdP Configuration Permissions
- Navigate to: Security → Administrators
- Review all users with admin roles that include IdP management permissions
- Limit IdP configuration capability to the absolute minimum number of administrators
- Create a custom admin role WITHOUT IdP management if possible:
- Navigate to: Security → Administrators → Roles → Create new role
- Exclude permissions:
okta.idps.manage,okta.policies.manage(for IDP_DISCOVERY type)
- Reassign administrators to the restricted role
Step 2: Audit Existing Identity Providers
- Navigate to: Security → Identity Providers
- Document all configured IdPs:
- Name, type, status, created date, created by
- Flag any IdPs that are unfamiliar or recently created
- Verify each IdP has a legitimate business purpose
Step 3: Audit Routing Rules
- Navigate to: Security → Identity Providers → Routing Rules
- Review all routing rules:
- Verify each rule routes to a legitimate IdP
- Check for overly broad conditions (e.g., “all users” routing to an external IdP)
- Flag any recently created or modified rules
Step 4: Create SIEM Alerts for IdP Lifecycle Events Configure alerts in your SIEM for these system log events:
system.idp.lifecycle.create— New IdP createdsystem.idp.lifecycle.update— IdP configuration modifiedsystem.idp.lifecycle.activate— IdP activatedsystem.idp.lifecycle.deactivate— IdP deactivatedpolicy.lifecycle.create/policy.lifecycle.update(where policy type = IDP_DISCOVERY) — Routing rule changes
Code Implementation
Code Pack: API Script
# Audit all configured identity providers
info "5.5 Listing all configured identity providers..."
IDPS=$(okta_get "/api/v1/idps" 2>/dev/null || echo "[]")
IDP_COUNT=$(echo "${IDPS}" | jq 'length' 2>/dev/null || echo "0")
# Audit IDP discovery (routing) policies
info "5.5 Auditing IDP discovery (routing) policies..."
IDP_POLICIES=$(okta_get "/api/v1/policies?type=IDP_DISCOVERY" 2>/dev/null || echo "[]")
IDP_POLICY_COUNT=$(echo "${IDP_POLICIES}" | jq 'length' 2>/dev/null || echo "0")
if [ "${IDP_POLICY_COUNT}" -gt 0 ]; then
info "5.5 Found ${IDP_POLICY_COUNT} IDP discovery policy/policies:"
echo "${IDP_POLICIES}" | jq -r '.[] | " - \(.name) (status: \(.status), lastUpdated: \(.lastUpdated))"' 2>/dev/null || true
# Get rules for each IDP discovery policy
for POLICY_ID in $(echo "${IDP_POLICIES}" | jq -r '.[].id' 2>/dev/null); do
info "5.5 Routing rules for policy ${POLICY_ID}:"
okta_get "/api/v1/policies/${POLICY_ID}/rules" 2>/dev/null \
| jq -r '.[] | " - Rule: \(.name)"' 2>/dev/null || true
done
fi
# Search system log for recent IdP lifecycle events (last 7 days)
info "5.5 Checking for recent IdP lifecycle events (last 7 days)..."
SINCE=$(date -d '7 days ago' -u +%Y-%m-%dT%H:%M:%S.000Z 2>/dev/null \
|| date -v-7d -u +%Y-%m-%dT%H:%M:%S.000Z 2>/dev/null || echo "")
if [ -n "${SINCE}" ]; then
IDP_EVENTS=$(okta_get "/api/v1/logs?filter=eventType+sw+%22system.idp.lifecycle%22&since=${SINCE}" 2>/dev/null || echo "[]")
EVENT_COUNT=$(echo "${IDP_EVENTS}" | jq 'length' 2>/dev/null || echo "0")
if [ "${EVENT_COUNT}" -gt 0 ]; then
warn "5.5 Found ${EVENT_COUNT} IdP lifecycle event(s) in the last 7 days -- INVESTIGATE IMMEDIATELY"
echo "${IDP_EVENTS}" | jq -r '.[] | " - \(.eventType): \(.actor.displayName) -> \(.target[0].displayName // "unknown") at \(.published)"' 2>/dev/null || true
else
pass "5.5 No IdP lifecycle events in the last 7 days"
fi
else
warn "5.5 Unable to compute date range -- skipping log check"
fi
Code Pack: DB Query
-- Alert: New Identity Provider Created (CRITICAL)
SELECT actor.displayName, actor.alternateId, target[0].displayName,
target[0].type, client.ipAddress, published
FROM okta_system_log
WHERE eventType IN (
'system.idp.lifecycle.create',
'system.idp.lifecycle.activate'
)
-- Alert: Routing Rule Modified (HIGH)
SELECT actor.displayName, target[0].displayName, published
FROM okta_system_log
WHERE eventType IN ('policy.lifecycle.create', 'policy.lifecycle.update')
AND debugContext.debugData.policyType = 'IDP_DISCOVERY'
Code Pack: Sigma Detection Rules (2)
detection:
selection:
eventType:
- 'policy.lifecycle.create'
- 'policy.lifecycle.update'
filter_policy_type:
debugContext.debugData.policyType: 'IDP_DISCOVERY'
condition: selection and filter_policy_type
fields:
- actor.displayName
- target.displayName
- client.ipAddress
- published
detection:
selection:
eventType:
- 'system.idp.lifecycle.create'
- 'system.idp.lifecycle.activate'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- target.displayName
- target.type
- client.ipAddress
- published
Validation & Testing
- Verify IdP management is restricted to minimum necessary administrators
- Confirm all existing IdPs have documented business justification
- Verify SIEM alerts are configured for
system.idp.lifecycle.*events - Test alert: Create a test IdP in a sandbox tenant and verify alert fires
Monitoring & Maintenance
SIEM alert rules (CRITICAL – investigate immediately): See Code Pack section 5.5 (db) above for IdP creation and routing rule modification detection queries.
Maintenance schedule:
- Weekly: Review IdP configuration and routing rules for unauthorized changes
- Monthly: Verify SIEM alerts for IdP events are functioning (test with log injection)
- On any alert fire: Immediately investigate — this is a high-severity indicator
5.6 Run HealthInsight Security Reviews
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | CA-7, RA-5 |
Description
Run Okta HealthInsight regularly to assess your tenant’s security posture against Okta’s 16 built-in security recommendations. HealthInsight provides a posture score and actionable remediation guidance for common misconfigurations.
Rationale
Why This Matters:
- HealthInsight is free and built into every Okta admin console — no additional license needed
- Provides automated detection of common security misconfigurations
- Serves as a baseline security checklist aligned with Okta’s own best practices
- Posture score tracking over time demonstrates continuous improvement for auditors
ClickOps Implementation
Step 1: Access HealthInsight
- Navigate to: Security → HealthInsight
- Review the dashboard showing overall posture score
Step 2: Review All 16 Recommendations
| # | HealthInsight Check | Category |
|---|---|---|
| 1 | Admin MFA enrollment | Authentication |
| 2 | User MFA enrollment | Authentication |
| 3 | Phishing-resistant authenticator enabled | Authentication |
| 4 | Password policy complexity | Password |
| 5 | Password policy age settings | Password |
| 6 | Common password check enabled | Password |
| 7 | Account lockout configured | Account Security |
| 8 | Session timeout configured | Session |
| 9 | Persistent sessions disabled | Session |
| 10 | ThreatInsight enabled and set to block | Threat Protection |
| 11 | Network zones configured | Network |
| 12 | Suspicious Activity Reporting enabled | Monitoring |
| 13 | New sign-on notification enabled | Notifications |
| 14 | Authenticator enrollment notification enabled | Notifications |
| 15 | Password change notification enabled | Notifications |
| 16 | System log forwarding configured | Logging |
Step 3: Remediate Failed Checks
- For each check with Failed or Warning status:
- Click the recommendation for detailed remediation steps
- Follow Okta’s guided remediation
- Mark as resolved after implementation
- Target: All 16 checks should show Passed
Step 4: Schedule Regular Reviews
- Set a monthly calendar reminder to review HealthInsight
- Document posture score in your security metrics dashboard
- Include HealthInsight review in your quarterly security review process
Validation & Testing
- Navigate to Security → HealthInsight and verify it loads
- Document current posture score as baseline
- Verify all 16 checks have been reviewed
- Remediate any Failed checks and confirm they move to Passed
Monitoring & Maintenance
Maintenance schedule:
- Monthly: Run HealthInsight review, remediate new findings
- Quarterly: Report posture score to security leadership
- After configuration changes: Re-run HealthInsight to verify no regression
6. Third-Party Integration Security
6.1 Integration Risk Assessment Matrix
| Risk Factor | Low | Medium | High |
|---|---|---|---|
| OAuth Scopes | Profile read-only | Read user data | Write users, groups, apps |
| SCIM Access | No SCIM | Read-only sync | Create/delete users |
| Admin API | No API access | Limited endpoints | Full API access |
| Data Access | User profile only | Group membership | Authentication data |
Code Pack: API Script
info "6.1 Fetching active applications..."
ACTIVE_APPS=$(okta_get "/api/v1/apps?filter=status%20eq%20%22ACTIVE%22&limit=200" 2>/dev/null || echo "[]")
TOTAL_APPS=$(echo "${ACTIVE_APPS}" | jq 'length' 2>/dev/null || echo "0")
6.2 Common Integrations and Recommended Controls
Salesforce
Risk Level: High (SSO + Provisioning) Controls:
- ✅ SCIM token rotation quarterly
- ✅ Limit provisioned attributes
- ✅ Enable Salesforce IP restrictions
Microsoft 365
Risk Level: High (Federation) Controls:
- ✅ Configure federation trust validation
- ✅ Disable legacy authentication
- ✅ Sync conditional access policies
GitHub Enterprise
Risk Level: High (Code access) Controls:
- ✅ SAML SSO with MFA
- ✅ Disable username/password fallback
- ✅ Sync team membership carefully
Code Pack: API Script
info "6.2 Fetching active OAuth/OIDC applications..."
ACTIVE_APPS=$(okta_get "/api/v1/apps?filter=status%20eq%20%22ACTIVE%22&limit=200" 2>/dev/null || echo "[]")
OAUTH_APPS=$(echo "${ACTIVE_APPS}" | jq '[.[] | select(.signOnMode == "OPENID_CONNECT" or .signOnMode == "OAUTH_2_0")]' 2>/dev/null || echo "[]")
OAUTH_COUNT=$(echo "${OAUTH_APPS}" | jq 'length' 2>/dev/null || echo "0")
# Fetch grants for this application
GRANTS=$(okta_get "/api/v1/apps/${APP_ID}/grants" 2>/dev/null || echo "[]")
GRANT_COUNT=$(echo "${GRANTS}" | jq 'length' 2>/dev/null || echo "0")
if [ "${GRANT_COUNT}" -eq 0 ]; then
info "6.2 ${APP_LABEL}: no explicit scope grants"
continue
fi
# Extract all granted scope IDs
SCOPE_LIST=$(echo "${GRANTS}" | jq -r '.[].scopeId // empty' 2>/dev/null || true)
# Check default authorization server
AUTH_CLIENTS=$(okta_get "/api/v1/authorizationServers/default/clients" 2>/dev/null || echo "[]")
DEFAULT_CLIENT_COUNT=$(echo "${AUTH_CLIENTS}" | jq 'length' 2>/dev/null || echo "0")
if [ "${DEFAULT_CLIENT_COUNT}" -gt 0 ]; then
info "6.2 Default auth server has ${DEFAULT_CLIENT_COUNT} registered client(s):"
echo "${AUTH_CLIENTS}" | jq -r \
'.[] | " - \(.client_name // "unnamed") (ID: \(.client_id))"' \
2>/dev/null || true
else
info "6.2 No clients registered on default authorization server"
fi
# List all custom authorization servers
AUTH_SERVERS=$(okta_get "/api/v1/authorizationServers" 2>/dev/null || echo "[]")
CUSTOM_SERVERS=$(echo "${AUTH_SERVERS}" | jq '[.[] | select(.name != "default")]' 2>/dev/null || echo "[]")
CUSTOM_COUNT=$(echo "${CUSTOM_SERVERS}" | jq 'length' 2>/dev/null || echo "0")
if [ "${CUSTOM_COUNT}" -gt 0 ]; then
info "6.2 Found ${CUSTOM_COUNT} custom authorization server(s):"
echo "${CUSTOM_SERVERS}" | jq -r \
'.[] | " - \(.name) (ID: \(.id), audiences: \(.audiences // [] | join(", ")))"' \
2>/dev/null || true
fi
7. Operational Security
These controls address operational procedures and organizational practices that complement technical hardening. Many are driven by breach post-mortems and SOC 2 audit findings.
7.1 Sanitize HAR Files Before Sharing
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | SC-28, SI-12 |
Description
Establish a mandatory procedure to sanitize HTTP Archive (HAR) files before sharing with Okta support or any third party. HAR files capture all HTTP traffic including session cookies, authorization tokens, and CSRF tokens. The October 2023 Okta breach was caused by unsanitized HAR files uploaded to Okta’s support system.
Rationale
Why This Matters:
- HAR files contain active session tokens that can be replayed to hijack user sessions
- The October 2023 breach affected 134 customers whose HAR files contained valid session cookies
- Okta support regularly requests HAR files for troubleshooting — this is a recurring operational risk
- Automated sanitization reduces human error in the manual stripping process
Attack Prevented: Session hijacking via HAR file token exfiltration
Real-World Incidents:
- October 2023: Threat actor accessed Okta support system and extracted session tokens from HAR files uploaded by 134 customers
Implementation
Step 1: Create Organizational Policy Document a formal policy requiring:
- All HAR files MUST be sanitized before sharing with any external party
- Engineers must use the automated sanitization script (below) or approved tooling
- Random audits of support ticket attachments to verify compliance
Step 2: Manual Sanitization Procedure
- Open the HAR file in a text editor
- Search for and remove all values in these fields:
Cookierequest headersAuthorizationrequest headersSet-Cookieresponse headersx-csrf-tokenor similar CSRF headers- Any
Bearertoken values
- Save the sanitized file
- Verify no sensitive tokens remain by searching for common patterns:
sid=,sessionToken,Bearer,SSWS
Step 3: Automated Sanitization Script
Code Pack: CLI Script
# har-sanitize.sh - Strip sensitive headers from HAR files
# Usage: ./har-sanitize.sh input.har > sanitized.har
INPUT_FILE="$1"
if [ -z "$INPUT_FILE" ]; then
echo "Usage: $0 <input.har>"
exit 1
fi
jq '
.log.entries[].request.headers |= map(
if (.name | test("^(Cookie|Authorization|X-CSRF-Token|X-Okta-Session)$"; "i"))
then .value = "[REDACTED]"
else .
end
) |
.log.entries[].response.headers |= map(
if (.name | test("^(Set-Cookie)$"; "i"))
then .value = "[REDACTED]"
else .
end
) |
.log.entries[].request.cookies |= map(.value = "[REDACTED]") |
.log.entries[].response.cookies |= map(.value = "[REDACTED]")
' "$INPUT_FILE"
Step 4: Alternative Tools
- Google HAR Sanitizer Chrome Extension — browser-based sanitization
- BurpSuite — export filtered HAR with token stripping
- mitmproxy — can export sanitized HAR during capture
Validation & Testing
- Sanitization script is available and tested
- Policy documented and communicated to all IT/engineering staff
- Test: Generate a HAR file, sanitize it, verify no tokens remain by searching for
sid=,Bearer,SSWS
7.2 Monitor Okta Security Advisories
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | SI-5, RA-5 |
Description
Establish a process to monitor Okta security advisories and ensure all Okta client software (Verify, Browser Plugin) is kept up to date. Recent vulnerabilities include DLL hijacking in Okta Verify, XSS in the Browser Plugin, and iOS push notification bypasses.
Rationale
Why This Matters:
- Okta Verify for Windows was vulnerable to privilege escalation via DLL hijacking (fixed in 5.0.2)
- Okta Browser Plugin versions 6.5.0-6.31.0 were vulnerable to cross-site scripting
- Okta Verify for iOS had a push bypass allowing responses regardless of user selection
- Downstream dependencies (React/Next.js CVEs) affect Okta-integrated applications
- Okta maintains an active bug bounty program (153 valid issues, $405K paid)
Implementation
Step 1: Subscribe to Security Advisories
- Bookmark: trust.okta.com/security-advisories
- Subscribe to Okta’s security advisory RSS feed or email notifications
- Add to your security team’s weekly monitoring checklist
Step 2: Establish Client Update Policy
- Define maximum patch delay: Critical = 48 hours, High = 7 days, Medium = 30 days
- Use MDM to enforce Okta client updates:
- Jamf Pro (macOS): Auto-update Okta Verify via patch management
- Microsoft Intune (Windows): Deploy Okta Verify updates via Win32 app
- Chrome Enterprise: Force-update Okta Browser Plugin via policy
- Block outdated client versions from authenticating (via Device Assurance policies)
Step 3: Monitor Downstream Dependencies
- Track CVEs in frameworks used with Okta authentication:
- React Server Components (CVE-2025-55182)
- Next.js middleware (CVE-2025-29927)
- Auth0 SDK versions
- Include Okta dependency monitoring in your vulnerability management program
Validation & Testing
- Security advisory monitoring is assigned to a specific team member
- Client update policy is documented and enforced via MDM
- Verify all Okta Verify installations are on the latest version
7.3 Conduct Regular Access Reviews
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| NIST 800-53 | AC-2(3) |
| SOC 2 | CC6.1, CC6.2 |
Description
Perform periodic access reviews (recertification campaigns) to verify user access is appropriate and remove orphaned accounts, stale privileges, and excessive permissions. SOC 2 auditors specifically look for documented evidence of regular access reviews.
ClickOps Implementation
Step 1: Review Admin Accounts
- Navigate to: Security → Administrators
- Review all admin accounts:
- Verify each admin is a current employee with legitimate need
- Count Super Admin accounts — should be fewer than 5
- Remove admin access for anyone who has changed roles
- Document review with date and reviewer name
Step 2: Review User Accounts
- Navigate to: Directory → People
- Filter by Status: Active
- Cross-reference with HR system for terminated employees
- Suspend any accounts for users no longer with the organization
Step 3: Review Application Assignments
- Navigate to: Applications → Applications
- For each sensitive application, review assigned users/groups
- Remove users who no longer need access
Step 4: Review Group Memberships
- Navigate to: Directory → Groups
- Review privileged groups (admin groups, security groups)
- Remove members who no longer need membership
Code Implementation
Code Pack: API Script
info "7.3 Finding inactive users (no login in 90+ days)..."
ACTIVE_USERS=$(okta_get "/api/v1/users?filter=status+eq+%22ACTIVE%22&limit=200" 2>/dev/null || echo "[]")
TOTAL_ACTIVE=$(echo "${ACTIVE_USERS}" | jq 'length' 2>/dev/null || echo "0")
# Try the IAM assignees endpoint first
SUPER_ADMIN_COUNT=$(okta_get "/api/v1/iam/assignees/users?roleType=SUPER_ADMIN" 2>/dev/null \
| jq 'length' 2>/dev/null || echo "unknown")
if [ "${SUPER_ADMIN_COUNT}" != "unknown" ] && [ "${SUPER_ADMIN_COUNT}" -ge 0 ] 2>/dev/null; then
if [ "${SUPER_ADMIN_COUNT}" -gt 5 ]; then
warn "7.3 Super Admin count: ${SUPER_ADMIN_COUNT} (should be fewer than 5)"
else
pass "7.3 Super Admin count: ${SUPER_ADMIN_COUNT} (within recommended limit of < 5)"
fi
else
warn "7.3 Unable to count Super Admin assignments via IAM API"
# Fallback: enumerate users and check roles individually
info "7.3 Attempting fallback Super Admin enumeration (checking first 50 users)..."
super_count=0
for USER_ID in $(echo "${ACTIVE_USERS}" | jq -r '.[].id' 2>/dev/null | head -50); do
ROLES=$(okta_get "/api/v1/users/${USER_ID}/roles" 2>/dev/null || echo "[]")
IS_SUPER=$(echo "${ROLES}" | jq '[.[] | select(.type == "SUPER_ADMIN")] | length' 2>/dev/null || echo "0")
if [ "${IS_SUPER}" -gt 0 ]; then
USER_LOGIN=$(echo "${ACTIVE_USERS}" | jq -r ".[] | select(.id == \"${USER_ID}\") | .profile.login" 2>/dev/null || echo "unknown")
warn "7.3 Super Admin: ${USER_LOGIN}"
super_count=$((super_count + 1))
fi
done
SUPER_ADMIN_COUNT="${super_count}"
if [ "${super_count}" -gt 5 ]; then
warn "7.3 Found ${super_count} Super Admin(s) in first 50 users (should be < 5)"
else
pass "7.3 Found ${super_count} Super Admin(s) in first 50 users"
fi
fi
info "7.3 Listing admin role assignments..."
ADMIN_ROLES=$(okta_get "/api/v1/iam/assignees/users" 2>/dev/null || echo "[]")
ADMIN_COUNT=$(echo "${ADMIN_ROLES}" | jq 'length' 2>/dev/null || echo "0")
if [ "${ADMIN_COUNT}" -gt 0 ]; then
info "7.3 Found ${ADMIN_COUNT} admin role assignment(s)"
echo "${ADMIN_ROLES}" | jq -r \
'.[] | " - User: \(.userId), Role: \(.role // .type // "unknown")"' \
2>/dev/null || true
fi
Quarterly Access Review Checklist
- All admin accounts verified against current employee list
- Super Admin count is < 5
- No orphaned accounts (users who left but weren’t deprovisioned)
- No accounts with last login > 90 days (unless exempted)
- Privileged group memberships reviewed and justified
- Sensitive application assignments reviewed
- Review documented with date, reviewer, and findings
Monitoring & Maintenance
Maintenance schedule:
- Monthly: Review admin accounts for changes
- Quarterly: Full access review (all users, groups, applications)
- On employee termination: Immediate account deprovisioning (verify within 24 hours)
- Annually: Document access review program for SOC 2 auditors
7.4 Implement Change Management for Okta Configuration
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | CM-3 |
| SOC 2 | CC8.1 |
Description
Establish a change management process for Okta configuration changes. All modifications to authentication policies, admin roles, network zones, and integrations should be tracked, approved, and auditable.
Implementation
Step 1: Define Change Categories
| Change Type | Approval Required | Examples |
|---|---|---|
| Critical | Security team + management | Authentication policy changes, admin role modifications, IdP configuration |
| Standard | Security team | Application integration, group membership changes, network zone updates |
| Low Risk | Self-approved (with logging) | User profile updates, non-privileged group changes |
Step 2: Track Configuration as Code
- Export Okta configuration using Terraform (see Code Pack section 7.4 cli for commands)
- Store Terraform state in version control
- Require pull request review for all Okta Terraform changes
- Use
terraform plandiff as the change documentation
Step 3: Monitor Configuration Changes via System Log Key events to track:
| Event Type | Description |
|---|---|
policy.lifecycle.create |
New policy created |
policy.lifecycle.update |
Policy modified |
policy.lifecycle.delete |
Policy deleted |
policy.rule.create |
Policy rule created |
policy.rule.update |
Policy rule modified |
application.lifecycle.create |
New application added |
application.lifecycle.update |
Application modified |
group.user_membership.add |
User added to group |
group.user_membership.remove |
User removed from group |
zone.lifecycle.create |
Network zone created |
zone.lifecycle.update |
Network zone modified |
system.role.create |
Admin role created |
Step 4: Implement Separation of Duties
- No single admin can both propose and approve critical changes
- Require two-person integrity for authentication policy modifications
- Use Okta Workflows to enforce approval gates for critical changes
Code Pack: Sigma Detection Rules (5)
detection:
selection:
eventType:
- 'application.lifecycle.create'
- 'application.lifecycle.update'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- eventType
- target.displayName
- client.ipAddress
- published
detection:
selection:
eventType:
- 'group.user_membership.add'
- 'group.user_membership.remove'
condition: selection
fields:
- actor.displayName
- eventType
- target.displayName
- client.ipAddress
- published
detection:
selection:
eventType:
- 'zone.lifecycle.create'
- 'zone.lifecycle.update'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- eventType
- target.displayName
- client.ipAddress
- published
detection:
selection:
eventType:
- 'policy.lifecycle.create'
- 'policy.lifecycle.update'
- 'policy.lifecycle.delete'
- 'policy.rule.create'
- 'policy.rule.update'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- eventType
- target.displayName
- client.ipAddress
- published
detection:
selection:
eventType: 'system.role.create'
condition: selection
fields:
- actor.displayName
- actor.alternateId
- eventType
- target.displayName
- client.ipAddress
- published
Validation & Testing
- Change management process documented
- Configuration tracked in version control (Terraform or equivalent)
- SIEM alerts configured for unauthorized configuration changes
- Separation of duties enforced for critical changes
7.5 Establish Identity Incident Response Procedures
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| NIST 800-53 | IR-4, IR-6 |
| SOC 2 | CC7.3 |
Description
Document specific response procedures for identity-based security incidents. These runbooks complement your organization’s broader incident response plan with Okta-specific actions and API calls.
Incident Response Runbooks
Runbook 1: Compromised Admin Account
- Contain: Immediately suspend the admin account (see api-ir-suspend-admin in Code Pack)
- Revoke: Clear all active sessions (see api-ir-revoke-sessions in Code Pack)
- Investigate: Audit all changes made by the compromised account (see api-ir-audit-changes in Code Pack)
- Remediate: Reset credentials, re-enroll MFA, review all configuration changes
- Restore: Reactivate account only after re-verification of identity
Runbook 2: Stolen Session Tokens
- Revoke all active sessions for affected users
- Identify the source of token theft (HAR files, malware, XSS)
- Block the source IPs in network zones
- Force re-authentication for all affected users
Runbook 3: Malicious IdP Creation
- Deactivate the malicious IdP immediately (see api-ir-deactivate-idp in Code Pack)
- Audit all authentications that used the malicious IdP
- Revoke sessions for all users who authenticated via the malicious IdP
- Investigate which admin created it and whether their account is compromised
Runbook 4: Unauthorized MFA Enrollment
- Remove the unauthorized factor (see api-ir-delete-factor in Code Pack)
- Investigate how the enrollment occurred (account takeover, social engineering of helpdesk)
- Force password reset and MFA re-enrollment under verified identity
- Review all account activity since the unauthorized enrollment
Runbook 5: Mass Password Spray Attack
- Activate IP blocking for source IPs via ThreatInsight and network zones
- Review lockout logs to identify targeted accounts
- Communicate to affected users about potential credential exposure
- Force password reset for accounts that were targeted
- Verify MFA is enforced – password spray is only effective without MFA
Code Pack: API Script
curl -X POST "https://${OKTA_DOMAIN}/api/v1/users/${USER_ID}/lifecycle/suspend" \
-H "Authorization: SSWS ${OKTA_API_TOKEN}"
curl -X DELETE "https://${OKTA_DOMAIN}/api/v1/users/${USER_ID}/sessions" \
-H "Authorization: SSWS ${OKTA_API_TOKEN}"
curl -s -X GET "https://${OKTA_DOMAIN}/api/v1/logs?filter=actor.id+eq+%22${USER_ID}%22&since=${INCIDENT_START}" \
-H "Authorization: SSWS ${OKTA_API_TOKEN}" | jq '.[] | {eventType, target, published}'
curl -X POST "https://${OKTA_DOMAIN}/api/v1/idps/${IDP_ID}/lifecycle/deactivate" \
-H "Authorization: SSWS ${OKTA_API_TOKEN}"
curl -X DELETE "https://${OKTA_DOMAIN}/api/v1/users/${USER_ID}/factors/${FACTOR_ID}" \
-H "Authorization: SSWS ${OKTA_API_TOKEN}"
Validation & Testing
- All 5 runbooks documented and accessible to security team
- API commands tested in sandbox environment
- Security team trained on runbook execution
- Runbooks integrated into broader incident response plan
Monitoring & Maintenance
Maintenance schedule:
- Quarterly: Review and update runbooks based on new attack techniques
- After each incident: Conduct post-incident review and update relevant runbook
- Annually: Conduct tabletop exercise using runbooks
8. Compliance Quick Reference
8.1 SOC 2 Trust Services Criteria
| Control ID | Okta Control | Guide Section |
|---|---|---|
| CC6.1 | Phishing-resistant MFA | 1.1 |
| CC6.1 | Access reviews & recertification | 7.3 |
| CC6.2 | Admin role separation | 1.2 |
| CC6.6 | Network zone policies | 2.1 |
| CC7.2 | System log monitoring | 5.1 |
| CC7.3 | Identity incident response | 7.5 |
| CC8.1 | Change management | 7.4 |
8.2 NIST 800-53 Rev 5
| Control | Okta Control | Guide Section |
|---|---|---|
| AC-2 | NHI governance | 3.4 |
| AC-2(3) | Account lifecycle | 1.6 |
| AC-2(3) | Access reviews | 7.3 |
| AC-3 | Default authentication policy audit | 1.9 |
| AC-3 | Dynamic network zones | 2.3 |
| AC-5 | Admin role separation | 1.2 |
| AC-6(1) | Custom admin roles | 1.2 |
| AC-7 | Account lockout | 1.5 |
| AC-12 | Session timeouts | 4.1 |
| AU-2 | System log | 5.1 |
| AU-6 | Cross-tenant impersonation monitoring | 5.5 |
| CA-7 | HealthInsight reviews | 5.6 |
| CM-3 | Change management | 7.4 |
| CM-7 | OAuth app allowlisting | 3.3 |
| IA-2(1) | MFA enforcement | 1.1 |
| IA-2(6) | FIDO2 for admins | 1.1 |
| IA-2(12) | PIV/CAC authentication | 1.7 |
| IA-4 | NHI governance | 3.4 |
| IA-5(1) | Password policy | 1.4 |
| IA-5(1) | Self-service recovery hardening | 1.10 |
| IA-11 | Self-service recovery hardening | 1.10 |
| IR-4 | Identity incident response | 7.5 |
| IR-6 | End-user security notifications | 1.11 |
| RA-5 | Security advisory monitoring | 7.2 |
| RA-5 | Identity Threat Protection | 5.3 |
| SC-7 | Dynamic network zones | 2.3 |
| SC-13 | FIPS compliance | 1.8 |
| SC-23 | Session persistence | 4.2 |
| SC-23 | Admin session security | 4.3 |
| SC-28 | HAR file sanitization | 7.1 |
| SI-4 | End-user security notifications | 1.11 |
| SI-4 | Identity Threat Protection | 5.3 |
| SI-4 | Behavior detection | 5.4 |
| SI-4 | Cross-tenant impersonation monitoring | 5.5 |
| SI-5 | Security advisory monitoring | 7.2 |
| SI-12 | HAR file sanitization | 7.1 |
8.3 NIST 800-63-4 AAL Mapping
NIST SP 800-63-4 (final July 2025) defines Authentication Assurance Levels. Map Okta configurations to AAL levels:
| AAL Level | Okta Configuration | Acceptable Authenticators | Guide Reference |
|---|---|---|---|
| AAL1 | Password only | Password (NOT recommended) | 1.4 |
| AAL2 | Password + any MFA | TOTP, Push, FIDO2, Syncable Passkeys | 1.1 |
| AAL2 (phishing-resistant) | Password + FIDO2 | WebAuthn, FastPass, Passkeys | 1.1, 1.3 |
| AAL3 | Hardware-bound authenticator | PIV/CAC, FIDO2 hardware key (non-syncable only) | 1.7 |
Key NIST 800-63-4 Changes:
- AAL2 MUST offer a phishing-resistant MFA option (Section 1.1)
- Syncable passkeys are now explicitly accepted at AAL2
- AAL3 requires hardware-bound authenticators (syncable passkeys NOT acceptable)
- Introduces Digital Identity Risk Management (DIRM) framework for continuous risk evaluation (Section 5.3)
8.4 DISA STIG Okta IDaaS V1R1
| STIG ID | Severity | Control | Guide Section |
|---|---|---|---|
| V-273186 | Medium | Global session idle timeout (15 min) | 4.1 |
| V-273187 | Medium | Admin Console idle timeout (15 min) | 4.1 |
| V-273188 | Medium | Account inactivity auto-disable (35 days) | 1.6 |
| V-273189 | Medium | Account lockout (3 attempts) | 1.5 |
| V-273190 | Medium | Dashboard phishing-resistant auth | 1.1 |
| V-273191 | Medium | Admin Console phishing-resistant auth | 1.1 |
| V-273192 | Medium | DOD warning banner | 8.5 |
| V-273193 | HIGH | Admin Console MFA required | 1.1 |
| V-273194 | HIGH | Dashboard MFA required | 1.1 |
| V-273195 | Medium | Password min length (15 chars) | 1.4 |
| V-273196 | Medium | Uppercase required | 1.4 |
| V-273197 | Medium | Lowercase required | 1.4 |
| V-273198 | Medium | Number required | 1.4 |
| V-273199 | Medium | Special character required | 1.4 |
| V-273200 | Medium | Min password age (24 hours) | 1.4 |
| V-273201 | Medium | Max password age (60 days) | 1.4 |
| V-273202 | HIGH | Centralized audit logging | 5.1 |
| V-273203 | Medium | Global session lifetime (18 hours) | 4.1 |
| V-273204 | Medium | PIV/CAC credential acceptance | 1.7 |
| V-273205 | Medium | FIPS-compliant Okta Verify | 1.8 |
| V-273206 | Medium | Disable persistent session cookies | 4.2 |
| V-273207 | Medium | Approved CA certificates | 1.7 |
| V-273208 | Medium | Common password check | 1.4 |
| V-273209 | Medium | Password history (5 generations) | 1.4 |
DISA STIG v1.1 (Feb 2026) adds five new checks for Non-Human Identity (NHI) security: service account governance, API token lifecycle management, and CC SRG alignment. See Section 3.4 for NHI governance controls.
8.5 Environment-Specific Requirements
DOD Warning Banner (DISA STIG V-273192)
For U.S. Government systems, display the Standard Mandatory DOD Notice and Consent Banner before granting access. Implementation requires customizing the Okta Sign-In Widget—refer to the “Okta DOD Warning Banner Configuration Guide” in the STIG package.
DOD Banner Text (1300 characters)
8.6 Compliance Checklist
Use this checklist to verify controls are implemented for your compliance requirements.
HIGH Priority Controls (DISA STIG)
- MFA required for Admin Console (V-273193) — Section 1.1
- MFA required for Dashboard (V-273194) — Section 1.1
- Audit logs forwarded to SIEM (V-273202) — Section 5.1
Authentication Controls
- Phishing-resistant authentication enabled (1.1)
- Admin role separation implemented (1.2)
- Password policy configured per requirements (1.4)
- Account lockout configured (1.5)
- Account inactivity automation active (1.6)
- Default authentication policy audited — zero apps assigned (1.9)
- Self-service recovery hardened — SMS/voice/questions disabled (1.10)
- End-user security notifications enabled — all five types (1.11)
- Suspicious activity reporting enabled (1.11)
- PIV/CAC Smart Card configured (if applicable) (1.7)
- FIPS compliance enabled (if applicable) (1.8)
Network & Integration Controls
- Network zones configured (2.1)
- Admin console access restricted by IP (2.2)
- Anonymizer/Tor blocking active (2.3)
- OAuth app allowlisting enforced (3.3)
- Non-human identity governance implemented (3.4)
- SSWS to OAuth 2.0 migration planned/completed (3.4)
Session Management
- Global session idle timeout configured (4.1)
- Admin Console session timeout configured (4.1)
- Global session lifetime limited (4.1)
- Persistent session cookies disabled (4.2)
- Admin session ASN binding verified active (4.3)
- Protected Actions enabled for critical operations (4.3)
Monitoring & Detection
- Log streaming or API integration active (5.1)
- ThreatInsight enabled (5.2)
- Identity Threat Protection configured (5.3) — if licensed
- Behavior detection rules active (5.4)
- Cross-tenant impersonation monitoring alerts configured (5.5)
- HealthInsight reviewed — all 16 checks passed (5.6)
Operational Security
- HAR file sanitization procedure documented (7.1)
- Security advisory monitoring assigned (7.2)
- Quarterly access reviews scheduled (7.3)
- Change management process for Okta config (7.4)
- Identity incident response procedures documented (7.5)
Appendix A: Edition Compatibility
| Control | Okta Starter | Okta SSO | Okta Adaptive | Okta Identity |
|---|---|---|---|---|
| MFA | ✅ | ✅ | ✅ | ✅ |
| FIDO2/WebAuthn | ✅ | ✅ | ✅ | ✅ |
| ThreatInsight | ❌ | ❌ | ✅ | ✅ |
| Device Trust | ❌ | ❌ | ✅ | ✅ |
| FastPass | ❌ | ❌ | ✅ | ✅ |
| Custom Admin Roles | ✅ | ✅ | ✅ | ✅ |
| Log Streaming | Add-on | Add-on | ✅ | ✅ |
| Workflows/Automations | Add-on | Add-on | ✅ | ✅ |
| Identity Threat Protection | ❌ | ❌ | ❌ | Add-on |
| Behavior Detection | ❌ | ❌ | ✅ | ✅ |
| HealthInsight | ✅ | ✅ | ✅ | ✅ |
| Protected Actions | ✅ | ✅ | ✅ | ✅ |
| Enhanced Dynamic Zones | ❌ | ❌ | ✅ | ✅ |
| Identity Governance (OIG) | ❌ | ❌ | ❌ | Add-on |
Appendix B: References
Official Okta Documentation:
- Trust Center
- Security Trust Center (SafeBase)
- Help Center
- Security Advisories
- 9 Admin Best Practices
- Securing Admin Accounts
- Secure Identity Commitment Whitepaper (Aug 2025)
- Admin Role Permissions
- HealthInsight Recommendations
- Suspicious Activity Reporting
- Protected Actions
- Protecting Admin Sessions
- Blocking Anonymizers
- Global Session Policies
- Identity Threat Protection
- Non-Human Identities
- OAuth Migration from SSWS
- Identity Security Checklist
- Secure Identity Assessment
API Documentation:
Compliance Frameworks:
- SOC 2 Type II, ISO 27001, ISO 27017, ISO 27018, FedRAMP High, FedRAMP Moderate, FIPS 140-2, HIPAA, PCI DSS v4.0, CSA STAR, NIST 800-53 Rev 5 — via Okta Compliance
- DISA STIG Library — Okta IDaaS STIG V1R1 (March 2025), v1.1 NHI update (Feb 2026)
- DISA STIG Detail View
- CIS Controls v8
- NIST 800-53 Rev 5
- NIST SP 800-63-4 Final (July 2025)
Third-Party Security Research:
- Nudge Security — 6 Critical Okta Configurations
- Obsidian Security — Fortify Okta Against Session Token Compromise
- Obsidian Security — Cross-Tenant Impersonation in Okta
- AppOmni — Better SaaS Security with Okta Identity Engine
CISA & Government:
Security Incidents:
-
October 2023: Unauthorized access to Okta support system via compromised service account; HAR files containing session cookies exfiltrated, affecting 134 customers (all 18,400 notified) — Root Cause Investigation Closure - January 2022: LAPSUS$ group compromised a Sitel (sub-processor) support engineer for 25 minutes, impacting 2 customers — Okta Investigation
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2026-02-10 | 0.3.0 | draft | Comprehensive audit against Okta SIC, DISA STIG v1.1, NIST 800-63-4, Obsidian/Nudge/AppOmni research. Added 15 new controls: Default Auth Policy Backstop (1.9), Self-Service Recovery (1.10), End-User Notifications (1.11), Dynamic Zones (2.3), OAuth Allowlisting (3.3), NHI Governance (3.4), Admin Session Security (4.3), ITP (5.3), Behavior Detection (5.4), Cross-Tenant Impersonation (5.5), HealthInsight (5.6), HAR Sanitization (7.1), Security Advisory Monitoring (7.2), Access Reviews (7.3), Change Management (7.4), Incident Response (7.5). Expanded compliance mappings with NIST 800-63-4 AAL mapping. | Claude Code (Opus 4.6) |
| 2025-12-26 | 0.2.0 | draft | Integrated DISA STIG Okta IDaaS V1R1 controls into functional sections | Claude Code (Opus 4.5) |
| 2025-12-14 | 0.1.0 | draft | Initial Okta hardening guide | Claude Code (Opus 4.5) |
Questions or Improvements?
- Open an issue: GitHub Issues
- Contribute: Contributing Guide