heroui logo

Application Using Device Code Authentication Flow

Sigma Rules

View Source
Summary
The detection rule is centered around identifying unauthorized or misconfigured use of the Device Code Authentication Flow within Azure environments. Device code flow is part of the OAuth 2.0 protocol designed mainly for input-constrained devices, which means it should typically be restricted to situations where traditional input methods (like keyboards) are not available. If an application is utilizing this flow in scenarios where it should not, it raises a red flag that may indicate either a misconfiguration of the application or potentially malicious activity. The rule aims to capture logs in Azure's signin logs that match this authentication flow, enabling security teams to investigate and act upon such incidents. The detection logic is based on the presence of the phrase 'Device Code' within the log message, ensuring that only instances of this specific authentication type are evaluated. The potential for false positives is acknowledged, with the rule categorizing legitimate uses in input-constrained applications separately, advising thorough investigation where misuse is suspected. Overall, this rule helps reinforce OAuth 2.0 flow best practices and strengthens the security posture by monitoring for potentially erroneous or malicious authentication behaviors.
Categories
  • Cloud
  • Azure
  • Application
Data Sources
  • Logon Session
  • Application Log
  • Cloud Service
Created: 2022-06-01