heroui logo

Azure Firewall Rule Collection Modified or Deleted

Sigma Rules

View Source
Summary
This detection rule is designed to identify modifications or deletions of Azure Firewall rule collections, specifically targeting Application, NAT, and Network rules. The rule monitors the Azure activity logs for specific operations related to these rule collections. It tracks sessions in which the operations 'WRITE' or 'DELETE' are executed for the specified service components. By monitoring these activities, security professionals can detect potential unauthorized changes to firewall rules that might compromise the security posture of an Azure environment. False positive considerations include legitimate actions taken by system administrators, necessitating a review of user identities and associated credentials to confirm that modifications align with expected behaviors. Organizations are advised to have a robust oversight mechanism to investigate any anomalies in rule modifications, particularly from unfamiliar users.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
Created: 2021-08-08