Certificate-Based Authentication Enabled
Detects when certificate based authentication has been enabled in an Azure Active Directory tenant.
Sigma rule (View on GitHub)
1title: Certificate-Based Authentication Enabled
2id: c2496b41-16a9-4016-a776-b23f8910dc58
3status: test
4description: Detects when certificate based authentication has been enabled in an Azure Active Directory tenant.
5references:
6 - https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
7 - https://goodworkaround.com/2022/02/15/digging-into-azure-ad-certificate-based-authentication/
8author: Harjot Shah Singh, '@cyb3rjy0t'
9date: 2024-03-26
10tags:
11 - attack.defense-evasion
12 - attack.credential-access
13 - attack.persistence
14 - attack.privilege-escalation
15 - attack.t1556
16logsource:
17 product: azure
18 service: auditlogs
19detection:
20 selection:
21 OperationName: 'Authentication Methods Policy Update'
22 TargetResources.modifiedProperties|contains: 'AuthenticationMethodsPolicy'
23 condition: selection
24falsepositives:
25 - Unknown
26level: medium
References
Related rules
- CA Policy Removed by Non Approved Actor
- CA Policy Updated by Non Approved Actor
- Change to Authentication Method
- New Root Certificate Authority Added
- User Added To Group With CA Policy Modification Access