Skip to content

Commit

Permalink
add link to blog post
Browse files Browse the repository at this point in the history
  • Loading branch information
threat-punter authored Dec 8, 2020
1 parent 22b5448 commit d5a8660
Showing 1 changed file with 2 additions and 0 deletions.
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ Created by David French ([@threatpunter](https://twitter.com/threatpunter)) at [

Dorothy is a tool to help security teams test their monitoring and detection capabilities for their Okta environment. Dorothy has several modules to simulate actions that an attacker might take while operating in an Okta environment and actions that security teams should be able to audit. The modules are mapped to the relevant [MITRE ATT&CK®](https://attack.mitre.org/) tactics, such as persistence, defense evasion, and discovery.

Learn more about Dorothy and how to get started with it in [this blog post](https://www.elastic.co/blog/testing-okta-visibility-and-detection-dorothy).

[Elastic Security's](https://www.elastic.co/security) free detection rules for Okta can be found in our [detection-rules](https://github.com/elastic/detection-rules) repo. You can read [this blog post](https://www.elastic.co/blog/cloud-monitoring-and-detection-with-elastic-security) to learn more about how Elastic Security helps with cloud monitoring and detection.

Dorothy can change the configuration of your Okta environment. Consider using Dorothy in a test environment to avoid any risk of impacting your production environment.
Expand Down

0 comments on commit d5a8660

Please sign in to comment.