
Summary
The 'Azure Key Vault Certificate Accessed' detection rule is designed to identify unauthorized access attempts to Azure Key Vault certificates through read operations. This rule is crucial as adversaries may try to access sensitive certificates to extract service principal credentials or establish unauthorized persistence within a cloud environment using certificate-based authentication mechanisms. The rule monitors the 'Azure.MonitorActivity' log type and denotes its findings with an informational severity level. It is currently marked as experimental, implying that while it is functional, further refinement and validation may be necessary. The rule provides a detailed reference to the threat it addresses, linking it to specific MITRE ATT&CK techniques like TA0006: Credential Access and TA0009: Exfiltration. The rule details a specific runbook process for incident response, including investigating patterns of credential access and reviewing historical usage of the certificates in question.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Logon Session
- Application Log
ATT&CK Techniques
- T1555
- T1530
Created: 2026-01-14