
Summary
The detection rule identifies events related to the creation or modification of Azure Event Hub Authorization Rules. These rules manage access through cryptographic keys, making them critical for security, as unauthorized modifications can lead to privilege escalation or data exfiltration. The rule monitors the Azure activity logs for operations indicating authorization rules being written, specifically filtering for successful write operations. False positives may arise from legitimate administrative tasks, which can be managed by excluding certain known accounts and ensuring regular reviews and updates of authorized access. In case of an alarming event, immediate actions such as key rotation and enhanced monitoring are recommended to safeguard the system. Triage procedures guide handlers through effective investigation steps and the reference materials provide context on how to secure Azure Event Hubs.
Categories
- Cloud
Data Sources
- Web Credential
- Cloud Service
- Application Log
ATT&CK Techniques
- T1530
- T1537
Created: 2020-08-18