
Summary
The rule titled 'Azure Disk Deleted' is designed to detect incidents where an Azure managed disk has been deleted. The intention behind this monitoring is to identify potential unauthorized deletions which may indicate malicious activities such as ransomware attacks aimed at data destruction or hindering data recovery operations by deleting critical backup resources. Additionally, while such deletions can stem from malicious intent, they may also be part of legitimate operational practices like resource clean-up. The detection rule utilizes Azure Monitor Activity logs to log and analyze deletion operations tied to managed disks, focusing on various attributes including the 'callerIpAddress' and 'resourceId', to validate the legitimacy of deletion requests against a backdrop of historical activities. The rule is in an experimental phase and classified under the severity level 'Info'. It utilizes the MITRE ATT&CK framework to align incidents with relevant tactics (TA0040:T1485 and TA0040:T1490) related to data destruction activities. Good practices include querying surrounding activities before and after a deletion incident to determine if a pattern of deletions exists that would indicate ongoing malicious activity.
Categories
- Cloud
- Azure
- Infrastructure
Data Sources
- Cloud Service
- Logon Session
- Application Log
ATT&CK Techniques
- T1485
- T1490
Created: 2026-01-14