STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Okta Identity as a Service (IDaaS) Security Technical Implementation Guide

V-273202

CAT I (High)

Okta must off-load audit records onto a central log server.

Rule ID

SV-273202r1099766_rule

STIG

Okta Identity as a Service (IDaaS) Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001851CCI-000166CCI-001348

Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. Satisfies: SRG-APP-000358, SRG-APP-000080, SRG-APP-000125

Check Content

From the Admin Console:
1. Go to Reports >> Log Streaming.
2. Verify that a Log Stream connection is configured and active.

Alternately, interview the information system security manager (ISSM) and verify that an external Security Information and Event Management (SIEM) system is pulling Okta logs via an Application Programming Interface (API).

If either of these is not configured, this is a finding.

Fix Text

From the Admin Console:
1. Go to Reports >> Log Streaming.
2. Select either "AWS EventBridge" or "Splunk Cloud" and click "Next".
3. Complete the necessary fields and click "Save".

If Log Streaming is not an option because the SIEM required is not an option, customers can use the Okta Log API to export system logs in real time.