heroui logo

Azure Key Vault Key Permanently Purged

Panther Rules

View Source
Summary
This rule detects the permanent purging of keys within Azure Key Vault, which is a critical operation since purging a key irreversibly destroys it. Such actions might indicate malicious activities, including ransomware attacks or unauthorized data destruction. The rule generates alerts based on events logged in Azure Monitor Activity where the operation indicates that a key was permanently purged. Security analysts must investigate queries related to the calling IP address and assess other related activities performed by the user to determine if there is any malicious intent. Additionally, correlating multiple key purges from the same address can help in identifying patterns of behavior indicative of potential threats. Overall, the rule aims to safeguard key management processes and defend against potential data breaches or threats.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Logon Session
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1485
  • T1490
Created: 2026-01-14