
Azure Compute Snapshot Deletion by Unusual User and Resource Group
Elastic Detection Rules
View SourceSummary
This detection rule monitors for suspicious deletions of Azure disk snapshots in specific resource groups by unusual users. Azure snapshots are critical for backup and recovery, and their deletion can indicate potential adversarial behavior aiming to disrupt backups or remove forensic evidence. The rule triggers an alert when a snapshot deletion is performed by a user who hasn't interacted with the resource group in the last 7 days, suggesting possible unauthorized access. The detection leverages Azure activity logs to filter for deletion events marked with a status code of "Accepted". This rule also outlines significant investigation steps and response actions, including verifying the identity of the user, correlating events with other suspicious activities, and implementing preventive measures such as Azure Resource Locks and auditing of permissions.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Cloud Storage
- Application Log
ATT&CK Techniques
- T1485
- T1490
Created: 2025-10-10