
Summary
This detection rule identifies when an owner is removed from an application or service principal within Microsoft Azure's environment. The rule specifically monitors Azure's activity logs for specific messages indicating that ownership has been revoked, which could signify a potential security risk or unauthorized manipulation of application access controls. If an account that shouldn't be making such changes is identified, it raises concerns that warrant further investigation. The rule helps organizations enforce security by ensuring that owner assignments are monitored and that unauthorized changes are flagged.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- Application Log
Created: 2021-09-03