heroui logo

Azure Application Security Group Modified or Deleted

Sigma Rules

View Source
Summary
This rule detects modifications or deletions of Azure Application Security Groups (ASGs) through activity logs. ASGs are critical components in managing network security by grouping various resources and applying network security rules at a high level. Changes in ASGs may indicate unauthorized access attempts or misconfigurations that could compromise the security posture of applications hosted within Azure. The detection is triggered by specific operations within Azure Activity Logs related to Application Security Groups, specifically tracking the write and delete operations. A threshold for alerts is set to 'medium', indicating a significant yet not critical need for review. It's essential to verify the legitimacy of actions, especially when they originate from unknown users, to mitigate potential security risks. Alerts generated by this rule should prompt investigations, particularly when they deviate from established user behavior patterns.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
Created: 2021-08-16