
Summary
The analytic rule titled 'Azure AD Multiple Service Principals Created by SP' is designed to detect anomalous behavior within Azure Active Directory (AD) where a single service principal creates more than three unique OAuth applications within a 10-minute timeframe. By utilizing Azure AD's audit logs, the rule specifically observes the 'Add service principal' operation initiated by service principals. This behavior is critical to monitor as it strongly indicates potential misuse of credentials, whereby an attacker could exploit a compromised service principal to rapidly create multiple service principals, indicating potential pre-attack activities. If such actions are confirmed to be malicious, they could lead to unauthorized access or facilitate a more extensive network breach. The rule supports incident response by allowing security teams to swiftly investigate and respond to these suspicious activities.
Categories
- Identity Management
- Cloud
- Azure
Data Sources
- Cloud Service
- Active Directory
ATT&CK Techniques
- T1136
- T1136.003
Created: 2024-11-14