
Summary
This rule detects the permanent purging of an Azure Key Vault, which is an irreversible operation that results in the total destruction of all associated keys, secrets, and certificates. The action of purging a Key Vault can be indicative of malicious activities such as ransomware attacks or other forms of data destruction, as it is more severe than simply deleting a vault. The rule is built to monitor Azure MonitorActivity logs for specific operations linked to the purging of Key Vaults and analyzes the actions of the caller IP address surrounding the purge time to identify potential ongoing threats. The rule falls under the 'Experimental' category and possesses a low severity risk. It leverages tags such as 'Impact', 'Data Destruction', and 'Ransomware' to contextualize its focus.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- Network Traffic
ATT&CK Techniques
- T1485
- T1490
Created: 2026-01-14