SSO Authentication With Suspicious Characteristics
This Playbook is part of the Cortex Response And Remediation Pack.#
Supported versions
Supported Cortex XSOAR versions: 6.10.0 and later.
This playbook addresses the following alerts:
- SSO authentication attempt with suspicious characteristics.
- Successful SSO authentication with suspicious characteristics.
Playbook Stages:
Triage:
- Collect initial information about the user and the SSO authentication event.
- Validate whether the authentication proxy is linked to iCloud Relay.
Investigation:
- Check IOCs Reputation:
- Analyze the reputation of IP addresses associated with the alert.
- Search Related Alerts:
- Look for alerts related to the same user within the system to identify suspicious activity trends.
- Check If User Is Risky:
- Retrieve the user's risk score and evaluate high-risk indicators for suspicious activities.
- Check User Agent:
- Identify suspicious user agents used during the authentication attempts.
- Check Okta Logs:
- Retrieve Okta authentication logs for failed login attempts and suspicious authentication activities within the last day.
Containment:
- Automatic Actions:
- Clear user sessions if any suspicious evidence is found during the investigation.
- Analyst Review:
- Provide an analyst with findings for review and determine the appropriate action:
- No action required.
- Suspend the user in Okta.
- If the analyst chooses to suspend the user, their active sessions are cleared in Okta.
- Provide an analyst with findings for review and determine the appropriate action:
Requirements: For the best results, it's recommended to ensure these integrations are configured and working:
- Core integration for user risk evaluation and suspicious activity checks.
- Okta v2 integration for analyzing authentication logs, clearing sessions, and user suspension.
- Any IP reputation integration that supports the
!ipcommand for checking IP address reputation.
Dependencies#
This playbook uses the following sub-playbooks, integrations, and scripts.
Sub-playbooks#
This playbook does not use any sub-playbooks.
Integrations#
This playbook does not use any integrations.
Scripts#
- GetTime
- IncreaseAlertSeverity
- SearchAlertsV2
- SetAndHandleEmpty
- clear-user-session
- disable-user
- get-user-data
- ip-enrichment
Commands#
- closeInvestigation
- core-get-cloud-original-alerts
- okta-get-failed-logins
- okta-get-logs
Playbook Inputs#
There are no inputs for this playbook.
Playbook Outputs#
There are no outputs for this playbook.
Playbook Image#
