heroui logo

Authentications To Important Apps Using Single Factor Authentication

Sigma Rules

View Source
Summary
This detection rule is designed to monitor authentication activities to important applications on the Azure platform, specifically targeting instances where single-factor authentication (SFA) is employed. With the rise of multifactor authentication (MFA) as a security best practice, the reliance on SFA signifies a potential security vulnerability, especially for critical applications that may house sensitive data. When a successful authentication occurs to an important application that only requires single-factor authentication, it raises concerns regarding the robustness of the authentication method used. This rule can help identify instances where additional security measures might be required to enhance overall security posture. Administrators should evaluate these occurrences and determine if such authentications align with their organizational security policies and risk management strategies. The rule is implemented by monitoring Azure sign-in logs for authentication successes (status: success) to specified applications (AppId) that use SFA, which can act as indicators of potential security weaknesses.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Cloud Service
  • User Account
Created: 2022-07-28