Rare Subscription-level Operations In Azure

Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.

Sigma rule (View on GitHub)

 1title: Rare Subscription-level Operations In Azure
 2id: c1182e02-49a3-481c-b3de-0fadc4091488
 3status: test
 4description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
 5references:
 6    - https://github.com/Azure/Azure-Sentinel/blob/e534407884b1ec5371efc9f76ead282176c9e8bb/Detections/AzureActivity/RareOperations.yaml
 7author: sawwinnnaung
 8date: 2020/05/07
 9modified: 2023/10/11
10tags:
11    - attack.t1003
12logsource:
13    product: azure
14    service: activitylogs
15detection:
16    keywords:
17        - Microsoft.DocumentDB/databaseAccounts/listKeys/action
18        - Microsoft.Maps/accounts/listKeys/action
19        - Microsoft.Media/mediaservices/listKeys/action
20        - Microsoft.CognitiveServices/accounts/listKeys/action
21        - Microsoft.Storage/storageAccounts/listKeys/action
22        - Microsoft.Compute/snapshots/write
23        - Microsoft.Network/networkSecurityGroups/write
24    condition: keywords
25falsepositives:
26    - Valid change
27level: medium

References

Related rules

to-top