
Summary
This analytic rule detects when a user is assigned an eligible role in Azure Active Directory Privileged Identity Management (PIM). The detection is based on Azure AD events, specifically looking for the operation of adding an eligible member to a PIM role, which indicates a potential elevation of privileges. Such assignments grant users elevated access, making them crucial to monitor for any unauthorized activities. Malicious actors could exploit these privileged roles, allowing them to carry out unauthorized actions, breach sensitive data, or further compromise the system. Regular monitoring of this activity can help preemptively identify security breaches and mitigate risks associated with privilege escalation within the Azure AD environment.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Cloud Service
ATT&CK Techniques
- T1098
- T1098.003
Created: 2024-11-14