
Summary
This rule detects the assignment of the Privileged Authentication Administrator role to any Azure Active Directory (Azure AD) user by analyzing Azure AD audit logs. The rule triggers when the specified role is assigned, which is a critical action since this role enables the user to change authentication methods for any user, including those with high-level privileges like Global Administrators. If an unauthorized party gains this role, they could potentially reset credentials and exploit elevated privileges to access sensitive data or configurations. The detection is accomplished through a specific search query focused on Azure monitor logs, capturing details of the operation and the user involved. Best practices for implementation entail the necessary Splunk configurations and filtering legitimate administrative actions to minimize false positives.
Categories
- Identity Management
- Cloud
- Azure
Data Sources
- User Account
- Cloud Service
- Active Directory
ATT&CK Techniques
- T1003.002
- T1098.003
Created: 2024-11-14