Okta Integration

XGEN SOAR Integration

Sophisticated attackers often use compromised credentials to gain access to sensitive systems, which can completely elude signature-based defenses. D3 integrates with Okta’s identity cloud to handle credential-based attacks. Users can escalate suspicious events to D3 such as failed login attempts, which in turn trigger investigations in D3. During which, D3 can retrieve event logs from Okta and orchestrate response actions, such as temporarily blocking access for a compromised user.
Okta Integration

Integration features

1
Retrieve event logs from Okta into D3
2
Manage user accounts in Okta from D3
3
Enrich Okta events with threat intelligence, MITRE ATT&CK techniques, and more
4
Single sign-on for Okta and D3 SOAR

Key Use Case

#1

Event Enrichment

When a suspicious behavior is detected in Okta and escalated to D3, D3 can automatically or manually provide rich context that helps the analyst determine the risk level of the event. This includes searching across related Okta logs, as well as extracting IOCs to correlate against integrated threat intelligence platforms. Uniquely, D3 can also check the behavior against MITRE ATT&CK criteria, to determine what adversary techniques are present, and how they might fit into a larger attack.
#2

Response Orchestration

During a possible identity-based security incident, D3 is able to orchestrate immediate actions to limit the spread of the attack via integrations with other security tools. If the incident is confirmed as a true positive, the analyst can orchestrate policy changes in Okta from the D3 workflow. These might include suspending user access, requiring a password reset, or adjusting the policies associated with a user group.
X Okta Integration