
Summary
The Azure Firewall Policy Deletion detection rule aims to identify unauthorized deletions of firewall policies within an Azure environment. Such deletions may indicate attempts by adversaries to evade network defenses, thereby allowing them unauthorized access or facilitating data exfiltration. The rule operates by analyzing Azure activity logs for successful deletion events tagged with the operation name "MICROSOFT.NETWORK/FIREWALLPOLICIES/DELETE". When such an event occurs, security teams must verify the legitimacy of the action by examining the caller's identity, timestamp of activity, and correlating it with other security incidents. This helps in distinguishing between authorized administrative actions and potential malicious activities. The rule also outlines potential false positives that can arise from routine maintenance, automated script actions, and scheduled updates. Response actions involve resource isolation, investigation of the user actions, restoring deleted policies from backups, and enhancing security measures like multi-factor authentication for users with modification permissions.
Categories
- Cloud
- Azure
- Network
Data Sources
- Cloud Service
- Network Traffic
ATT&CK Techniques
- T1562
- T1562.001
Created: 2020-08-18