
Summary
The detection rule 'Bulk Deletion Changes To Privileged Account Permissions' is designed to identify instances where a user is removed from a privileged role in Azure Active Directory (AD). This is critical because unauthorized bulk deletions of users from privileged roles can indicate a potential security incident or malicious activity that may compromise user access and control over sensitive systems. The rule triggers when logs indicate the removal of a user from a privileged account, specifically through messages indicating 'Remove eligible member (permanent)' or 'Remove eligible member (eligible)'. Given the severity of possible implications when it comes to access management in enterprise environments, this rule is categorized with a high urgency level. Security teams are advised to investigate such events thoroughly, especially in bulk changes, to discern whether these actions were sanctioned or the result of a breach or compromise. The rule, while powerful, may generate false positives during legitimate administrative actions where an administrator lawfully removes users from roles. Therefore, the context of the changes must also be reviewed alongside the logs.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2022-08-05