heroui logo

Azure Storage Account Deleted

Panther Rules

View Source
Summary
The Azure Storage Account Deleted detection rule is designed to identify and alert on the deletion of Azure storage accounts. This deletion event is critical as it can signify potentially harmful activities such as ransomware attacks or malicious destruction of data. Given the destructive nature of this operation, early detection is essential to mitigate risks and initiate response protocols. The rule utilizes Azure Monitor Activity logs to track the specifics of deletion events, including the caller's IP address, which can help in identifying patterns that may indicate wider attacks. Additionally, the rule encompasses steps for incident response, including logging activities before the deletion event and examining associated IP addresses for known threats. The engagement with threat intelligence can further assess the legitimacy of the deletion and explore if the account deletion is part of a broader malicious strategy.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1485
  • T1490
Created: 2026-01-14