
Summary
This detection rule monitors for the creation, modification, or deletion of Azure Firewall resources within the Azure environment. Changes to Azure Firewalls can significantly affect the security posture of the applications and services that rely on them. The rule triggers when specific operation names related to Azure Firewalls are detected in the activity logs. The operations include both write and delete actions. It is essential to verify any modifications or deletions during audits or security assessments, as these actions might be conducted by legitimate system administrators or potentially by unauthorized users. Therefore, identifying the user identity and the context of the operation is critical to distinguishing normal activity from potential security incidents. Proper investigation into unfamiliar changes is necessary, and exemptions can be implemented for known behaviors to minimize false positives.
Categories
- Cloud
- Azure
Data Sources
- Logon Session
- Cloud Service
Created: 2021-08-08