heroui logo

Azure Key Vault Secret Accessed or Recovered

Panther Rules

View Source
Summary
The Azure Key Vault Secret Accessed or Recovered rule aims to detect activity related to Azure Key Vault secrets, specifically focusing on instances where these secrets are accessed or when soft-deleted secrets are recovered. Accessing secrets or recovering soft-deleted ones may signify malicious behavior, particularly attempts to retrieve removed credentials for unauthorized access. This rule monitors for Key Vault operations within the Azure Monitor Activity logs, enabling the identification of potentially suspicious actions based on the caller's IP address and associated identity management events. It is positioned under the category of credential access and collection of data from cloud storage, providing a systematic approach to incident response by suggesting queries to detect patterns of secret enumeration, bulk access, or related privilege escalations.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • Web Credential
  • Cloud Service
ATT&CK Techniques
  • T1555
  • T1530
Created: 2026-01-14