
Summary
This detection rule identifies instances in Microsoft Azure's Privileged Identity Management (PIM) where a privileged role can be activated without the requirement for Multi-Factor Authentication (MFA). This is a significant security concern, as the absence of MFA for role activation can expose an organization to unauthorized access and potential privilege escalation attacks. The rule, which operates at a high alert level, monitors for specific events tagged as 'noMfaOnRoleActivationAlertIncident'. When such an event is logged, likely indicating a user activated a role without fulfilling MFA requirements, security teams are alerted to investigate the incident. It is essential to note that while lack of MFA may not always indicate a compromise, it presents a risk that requires review, particularly if the user activity deviates from normal patterns. Furthermore, false positives may arise if users are indeed configured to perform MFA at other points of sign-in, thus necessitating a careful investigation of these cases to avoid undue alarm.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- User Account
- Cloud Service
Created: 2023-09-14