
Summary
This rule is designed to detect the unauthorized deletion of a Frontdoor Web Application Firewall (WAF) Policy within Azure environments, as such actions can signal attempts by adversaries to evade security measures and gain unauthorized access. The rule triggers an alert when a specific delete operation pertaining to WAF policies is logged as successful in the Azure activity logs. Given the crucial role of WAF policies in monitoring and filtering HTTP requests to web applications, any deletion can significantly increase the risks of data breaches and unauthorized access. False positives can occur due to legitimate actions taken by system administrators or maintenance scripts, so thorough verification of the user identities and the context surrounding the deletion is recommended to mitigate unnecessary alerts.
Categories
- Cloud
- Infrastructure
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1562
- T1562.001
Created: 2021-08-01