
Summary
The Azure Resource Group Deletion detection rule monitors for events where a resource group within Microsoft Azure is deleted. Resource groups are critical containers that hold related resources, and their deletion is irreversible, making it a potential vector for adversaries aiming to disrupt services or maliciously erase data. The rule utilizes Azure's activity logs to identify deletion events with a specific operation name, flagging those categorized as 'Success' for further investigation. The rule is designed to identify suspicious deletions that may indicate attacks or misuse of privileges, particularly when such actions originate from unfamiliar users or hosts. False positives may arise from legitimate administrator actions or routine maintenance, thus validating the identity and context surrounding the deletion is crucial. Investigations following a detection may involve reviewing activity logs, correlating with other suspicious events, and potentially implementing tighter access controls and monitoring for unusual deletion activities. Moreover, mitigation strategies may include restoring deleted resources from backups, isolating affected subscriptions, and conducting thorough audits of access permissions.
Categories
- Cloud
Data Sources
- Cloud Service
- Application Log
- User Account
ATT&CK Techniques
- T1485
- T1562
- T1562.001
Created: 2020-08-17