heroui logo

Azure New Application Credential

Anvilogic Forge

View Source
Summary
The detection rule titled 'Azure New Application Credential' aims to identify potential misuse of Azure application credentials, specifically focusing on scenarios where adversaries might create additional certificates or secret strings for an application to bypass security measures and maintain persistence within a cloud environment. It leverages Azure activity logs to monitor updates related to application credentials, enabling security teams to track changes to authentication methods. The rule is particularly associated with threat actor 'Storm-1283', highlighting the relevance of the detection in the context of known adversaries. The core logic of the detection is encapsulated in a Splunk query which retrieves relevant logs indicating updates to application credentials, measures their frequency, and aggregates the data over a specified time interval, producing a comprehensive overview of user activities that might indicate malicious behavior.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1528
  • T1078
Created: 2024-02-09