heroui logo

Azure AD Account Credential Leaked

Sigma Rules

View Source
Summary
The Azure AD Account Credential Leaked detection rule identifies instances where valid user credentials have been leaked, potentially compromising the security of the user's account. This detection focuses on events categorized as 'leakedCredentials' from the Azure risk detection service, indicating that the credentials have been exposed in a manner that could allow unauthorized access. The rule utilizes Azure's logs to monitor for the specific risk event types that indicate credential leaks. Set at a high detection level, it is crucial for organizations to be aware of such incidents to mitigate risks of account hijacking and data breaches. The likelihood of false positives exists, albeit rarely, due to issues like hash collisions. This rule is essential for identity protection in environments utilizing Azure Active Directory.
Categories
  • Cloud
  • Identity Management
  • Azure
Data Sources
  • User Account
  • Cloud Service
Created: 2023-09-03