
Summary
This detection rule is designed to monitor and alert on activities related to the retrieval of Bitlocker keys in an Azure environment. The rule focuses on identifying operations classified under the 'KeyManagement' category specifically targeting the 'Read BitLocker key' operation. Such retrievals could potentially indicate unauthorized access or attempts to bypass encryption mechanisms. By leveraging Azure audit logs, this rule helps organizations maintain the integrity and security of encrypted data, ensuring that key retrieval is only performed by authorized users. The detection condition is straightforward, as it activates on the specified selection criteria, providing a crucial layer of security oversight against possible defense evasion techniques.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- Logon Session
- Application Log
Created: 2022-06-28