heroui logo

Number Of Resource Creation Or Deployment Activities

Sigma Rules

View Source
Summary
This detection rule monitors the Azure activity logs for an anomalous number of resource creation or deployment activities, specifically focusing on the creation of virtual machines and deployment operations. By analyzing the frequency of these operations, the rule aims to identify potentially malicious activities that could indicate unauthorized resource creation, which is a common tactic employed during persistence attacks in cloud environments. The detection logic uses keywords associated with virtual machine and deployment creation actions to trigger alerts when unusual patterns are observed. The intended outcome is to facilitate proactive monitoring of Azure environments, helping security teams respond to possible threats before they escalate.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Logon Session
Created: 2020-05-07