heroui logo

Azure Key Vault Modified

Elastic Detection Rules

View Source
Summary
The rule 'Azure Key Vault Modified' is designed to detect modifications to Azure Key Vault resources, which are critical for managing sensitive data such as encryption keys, certificates, and passwords. Modifications can indicate unauthorized attempts to access or alter sensitive information, making this detection essential for maintaining security in cloud environments. The rule creates alerts for successful write operations on Key Vaults, specifically monitoring for the operation name 'MICROSOFT.KEYVAULT/VAULTS/WRITE'. The rule prompts investigators to check user identity, application activity, and access permissions to identify any unauthorized changes. False positives may occur due to routine administrative actions or automated scripts, and the rule provides guidance for investigating and responding to potential incidents. Steps include verifying the legitimacy of modifications, rotating secrets upon confirmation of unauthorized access, and improving access controls. This proactive approach ensures that sensitive data in Azure Key Vault is protected from potential breaches.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1552
  • T1552.001
Created: 2020-08-31