Rare Subscription-level Operations In Azure

Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.

Sigma rule (View on GitHub)

 1title: Rare Subscription-level Operations In Azure
 2id: c1182e02-49a3-481c-b3de-0fadc4091488
 3status: test
 4description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
 5references:
 6    - https://github.com/Azure/Azure-Sentinel/blob/e534407884b1ec5371efc9f76ead282176c9e8bb/Detections/AzureActivity/RareOperations.yaml
 7author: sawwinnnaung
 8date: 2020-05-07
 9modified: 2023-10-11
10tags:
11    - attack.t1003
12    - attack.credential-access
13logsource:
14    product: azure
15    service: activitylogs
16detection:
17    keywords:
18        - Microsoft.DocumentDB/databaseAccounts/listKeys/action
19        - Microsoft.Maps/accounts/listKeys/action
20        - Microsoft.Media/mediaservices/listKeys/action
21        - Microsoft.CognitiveServices/accounts/listKeys/action
22        - Microsoft.Storage/storageAccounts/listKeys/action
23        - Microsoft.Compute/snapshots/write
24        - Microsoft.Network/networkSecurityGroups/write
25    condition: keywords
26falsepositives:
27    - Valid change
28level: medium

References

Related rules

to-top