
Summary
This detection rule, identified as 'Azure User Elevated to User Access Administrator Role', is designed to monitor and alert on instances where a user upgrades their permissions to the 'User Access Administrator' role within Azure. This role is deemed highly privileged, as it confers the ability to manage user access across all Azure resources, assign roles to other users (including administrative roles), and administer permissions throughout the Azure subscription. With such extensive control, unauthorized elevation to this role poses significant security risks, making this rule crucial for maintaining governance over user privileges. The rule operates by querying Azure's audit logs for role assignment activities, flagging any unauthorized or suspicious elevation events. If an elevation is detected, the rule prompts subsequent steps to investigate the circumstances surrounding the elevation, including checking with the user and reviewing actions taken during the elevated access period for any further improper role assignments. Overall, this rule is critical to preventing potential misuse of administrative privileges that can lead to significant security vulnerabilities or data breaches.
Categories
- Cloud
- Azure
- Identity Management
- Infrastructure
Data Sources
- User Account
- Cloud Service
- Logon Session
- Application Log
ATT&CK Techniques
- T1098
- T1098.003
Created: 2026-01-31