
Summary
This rule aims to identify modifications made to application credentials within the Azure environment by monitoring activity logs. The key action of interest is when a message related to updating application certificates and secrets management is logged, indicating that credentials have been altered. This can be critical for auditing purposes since unauthorized changes to application credentials can lead to security vulnerabilities, including unauthorized access to resources. The rule is designed to trigger alerts when such changes occur, allowing security teams to investigate the legitimacy of the modification. Given that credential management is a sensitive area, the rule addresses the balance between ensuring security and minimizing false positives stemming from legitimate administrative actions. Careful verification of the user identity and context for such changes is encouraged to distinguish between authorized and unauthorized modifications. This helps maintain operational integrity while enhancing security oversight in the Azure environment.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Application Log
Created: 2021-09-02