March 27, 2024, 8:29 p.m. | /u/Extension-Delay5428

cybersecurity www.reddit.com

https://cybersec.xmcyber.com/s/attack-techniques-in-okta-part-2-okta-rbac-attacks-13704

explore the tactics employed by a red team to gain entry into an Okta environment. Additionally, we will examine how attackers use the Okta RBAC (Role-Based Access Control) module to elevate their privileges and move laterally within the Okta infrastructure.

access access control attackers control cybersecurity elevate entry environment infrastructure okta privileges rbac red team role role-based access control tactics team

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior InfoSec Manager - Risk and Compliance

@ Federal Reserve System | Remote - Virginia

Security Analyst

@ Fortra | Mexico

Incident Responder

@ Babcock | Chester, GB, CH1 6ER

Vulnerability, Access & Inclusion Lead

@ Monzo | Cardiff, London or Remote (UK)

Information Security Analyst

@ Unissant | MD, USA