
Summary
This detection rule monitors Azure Container Registries to flag any creation or deletion events. It utilizes activity logs from Azure to identify when these operations occur, specifically filtering for operations labeled as 'WRITE' or 'DELETE' under the Microsoft.ContainerRegistry resource. By monitoring these activities, the rule seeks to identify potentially anomalous behavior that could indicate unauthorized changes to container registry resources, which can impact the security of deployed applications utilizing these containers.
Categories
- Cloud
- Azure
- Containers
Data Sources
- Cloud Service
- Application Log
Created: 2021-08-07