heroui logo

Azure AD Privileged Role Assigned to Service Principal

Splunk Security Content

View Source
Summary
This analytic detection rule focuses on identifying the assignment of privileged roles to service principals within Azure Active Directory (AD). It utilizes the AuditLogs log category from ingested Azure AD events, which are critical for ensuring proper security measures. Service principals, which are non-human entities, being assigned elevated permissions poses significant threats, as malicious actors can exploit these privileges to gain unauthorized access to Azure resources. By continuously monitoring these activities, organizations can prevent privilege escalation and safeguard sensitive data and infrastructure from potential compromise. The detection logic is carried out through detailed search functions that filter relevant events and check against known privileged roles to ensure accurate alerts.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
  • Active Directory
ATT&CK Techniques
  • T1098
  • T1098.003
Created: 2024-11-14