heroui logo

Azure AD Block User Consent For Risky Apps Disabled

Splunk Security Content

View Source
Summary
This analytic rule detects potential security risks in Azure Active Directory (AD) by identifying when the risk-based step-up consent setting for risky applications is disabled. Monitoring the Azure AD logs for changes to the 'AllowUserConsentForRiskyApps' setting is critical because disabling this feature can expose organizations to OAuth phishing threats, potentially leading to unauthorized access to user data. The detection leverages logs from Azure Active Directory and specifically looks for operations related to the update authorization policy where this setting is altered. If confirmed malicious, such events reveal an organization's vulnerability to data breaches and compromise. Therefore, understanding the implications of such a configuration change is vital for maintaining security posture within Azure's cloud environment.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • Cloud Storage
  • User Account
ATT&CK Techniques
  • T1562
Created: 2024-11-14