
Summary
The Azure Key Vault Key Accessed or Recovered rule is designed to detect specific access patterns relating to cryptographic keys stored in Azure Key Vault. By monitoring for read operations and recovery actions on keys, it enables the identification of potential malicious or anomalous behavior by monitoring who accesses keys and when they do so. This is crucial because even though private keys in Key Vault cannot be exported, attackers may still attempt to gather metadata related to key usage to strategize further attacks or identify sensitive information. The rule emphasizes the importance of logging call details and usage patterns of keys to detect unauthorized access or key enumeration effectively. It provides recommendations to analyze surrounding activity, including the identity accessing keys and any potentially correlated requests within a specific timeframe. Additionally, the rule ties into the MITRE ATT&CK framework, indicating its relevance for credential access and discovery tactics.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1555
- T1087.004
Created: 2026-01-14