
Summary
This detection rule identifies when a privileged role assignment occurs outside of Azure Privileged Identity Management (PIM). Such assignments may indicate potential malicious activities, unauthorized access, or privilege escalation. The rule focuses on risk event types specifically tied to role assignments made outside the controlled environment of PIM, which is designed to manage, control, and monitor access to critical resources. Regularly monitoring these assignments is crucial for maintaining security, as unauthorized role assignments can lead to compromised accounts and exploitation of sensitive privileges. The detection mechanism in this rule is triggered by events classified under the risk event type 'rolesAssignedOutsidePrivilegedIdentityManagementAlertConfiguration'. Creating alerts around these events helps organizations enforce a policy that only allows role assignments through PIM, thereby reducing the risk of privilege abuse or attack. The rule emphasizes the importance of continuous monitoring and investigation of user behaviors concerning privileged role assignments.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- User Account
- Cloud Service
Created: 2023-09-14