heroui logo

Azure Runbook Webhook Created

Splunk Security Content

View Source
Summary
This analytic rule detects the creation of new Automation Runbook Webhooks within an Azure tenant by leveraging Azure Audit events specifically focused on the "Create or Update an Azure Automation webhook" operation. By monitoring this activity, the rule aims to prevent unauthorized access and manipulation of Azure resources since malicious actors could exploit webhooks to trigger Automation Runbooks without authentication, thereby executing arbitrary code or altering the configuration of Azure services. Effective monitoring ensures immediate response to potentially unauthorized or harmful changes to the Azure environment, significantly enhancing security measures.
Categories
  • Cloud
  • Azure
  • Infrastructure
Data Sources
  • Cloud Storage
  • Application Log
ATT&CK Techniques
  • T1078
  • T1078.004
Created: 2024-11-14