heroui logo

Changes To PIM Settings

Sigma Rules

View Source
Summary
This detection rule is designed to identify unauthorized changes to Privileged Identity Management (PIM) settings within Azure Active Directory. It focuses specifically on monitoring events that signify updates to role settings in the PIM system. The intent behind this rule is to provide security teams with insights into potential privilege escalation attacks or unauthorized modifications that may threaten the integrity of role assignments. It leverages audit logs from the Azure service to detect specific changes that match the predefined message pattern indicating that role settings have been altered. Recognizing that legitimate administrative actions may produce similar log entries, organizations are advised to carefully assess the context of detected changes to minimize false positives. The rule complements broader security operations by aligning with best practices and strategies for managing privileged identities in cloud environments, thus helping safeguard against possible exploits targeting privileged roles.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • Cloud Service
  • Logon Session
  • Application Log
Created: 2022-08-09