
Summary
The analytic rule detects the addition of new client credentials to Service Principals and Applications within Azure Active Directory (AD). This is accomplished by monitoring the Azure AD Audit Logs for operations related to updating application certificates and secrets management. Such modifications may indicate an adversary's intent to establish persistent access or escalate privileges within the Azure environment. Detecting this kind of activity is critical as malicious credentials could enable attackers to impersonate service principals, potentially compromising sensitive resources and accounts. The detection rule utilizes the `azure_monitor_aad` data source to reassess the user activities concerning service principal modifications, effectively alerting on significant changes that could indicate a breach or an active attack.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- Active Directory
- Application Log
ATT&CK Techniques
- T1098
- T1098.001
Created: 2024-11-14