heroui logo

Azure AD PIM Role Assignment Activated

Splunk Security Content

View Source
Summary
This analytic rule detects the activation of an Azure Active Directory Privileged Identity Management (PIM) role, identified by the Azure Active Directory event "Add member to role completed (PIM activation)". The monitoring of this activity is critical as PIM roles confer elevated privileges to users, and unauthorized activations can suggest malicious activities by adversaries attempting to gain privileged access. Such breaches can lead to unauthorized administrative actions or data breaches within the Azure environment. The rule leverages the Splunk platform, requiring ingestion of Azure AD events using the appropriate sourcetype and includes steps for actionable responses if the detection indicates a security incident.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Active Directory
ATT&CK Techniques
  • T1098
  • T1098.003
Created: 2024-11-14