A never used user is a user account created in Okta that never successfully authenticated to the Okta Dashboard for a certain number of days (90 days by default, customizable) since its creation.
They increase the attack surface for various reasons, such as:
A backdoor account allowing access to individuals who no longer require it, such as former employees or interns who never used this account.
Continued use of the default password, thus exposing the account to a higher risk of compromise. For example, a CISA alert reported that:
campaigns have also targeted dormant accounts belonging to users who no longer work at a victim organization but whose accounts remain on the system
and also that:
Following an enforced password reset for all users during an incident, SVR actors have also been observed logging into inactive accounts and following instructions to reset the password. This has allowed the actor to regain access following incident response eviction activities.
Waste of resources such as licenses. Regular identification, deactivation, or removal of unnecessary users allow organizations to optimize resource allocation and save unnecessary costs.
Also, consider the related IoE "Dormant User" which identifies all previously active users who have since become inactive. The risk is higher for privileged users. See also the related IOE, "Never Used Non-Privileged User", for non-privileged users.
Note: The IOE relies on the lastLogin
property, which has a known limitation: Okta only updates this value when a user accesses the Okta dashboard. As a result, SP-initiated authentications—such as when users access an application directly and are briefly redirected to Okta for authentication—do not update this property. Because of this, the IOE may report false positives for users who have never accessed the Okta dashboard but have successfully authenticated to applications. While Okta has documented a workaround, it is not currently compatible with Tenable Identity Exposure. As a result, you must manually exclude these false positives.
Tenable recommends regularly reviewing, and disabling or deleting these never used users, especially the privileged ones. After identifying them, take the following actions:
Name: Never Used Privileged User
Codename: NEVER-USED-PRIVILEGED-USER-OKTA
Severity: Medium
Type: Okta Indicator of Exposure