heroui logo

Multi-Factor Authentication Disabled for an Azure User

Elastic Detection Rules

View Source
Summary
This rule detects when multi-factor authentication (MFA) is disabled for an Azure user account, a significant security risk that allows adversaries to exploit weaker authentication methods. The disabling of MFA increases the vulnerability of the account, as it relies solely on passwords, which can be weak or compromised. A thorough investigation is warranted if this event is detected, including checking the identity of the account that made the change, associating alerts from the past 48 hours, and consulting documentation related to Azure MFA. A structured response and remediation plan should follow, focusing on limiting account access, reactivating MFA, reviewing accounts permissions, and understanding the investigation outcomes to bolster defenses against potential breaches. The rule utilizes Azure audit logs to identify successful disabling of strong authentication by searching for specific operational events.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
ATT&CK Techniques
  • T1098
Created: 2020-08-20