Okta must off-load audit records onto a central log server.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-273202 | OKTA-APP-001430 | SV-273202r1099766_rule | High |
Description |
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. Satisfies: SRG-APP-000358, SRG-APP-000080, SRG-APP-000125 |
STIG | Date |
Okta Identity as a Service (IDaaS) Security Technical Implementation Guide | 2025-05-06 |
Details
Check Text (C-77293r1099765_chk) |
From the Admin Console: 1. Go to Reports >> Log Streaming. 2. Verify that a Log Stream connection is configured and active. Alternately, interview the information system security manager (ISSM) and verify that an external Security Information and Event Management (SIEM) system is pulling Okta logs via an Application Programming Interface (API). If either of these is not configured, this is a finding. |
Fix Text (F-77198r1098872_fix) |
From the Admin Console: 1. Go to Reports >> Log Streaming. 2. Select either "AWS EventBridge" or "Splunk Cloud" and click "Next". 3. Complete the necessary fields and click "Save". If Log Streaming is not an option because the SIEM required is not an option, customers can use the Okta Log API to export system logs in real time. |