heroui logo

Azure Start Virtual Machine

Anvilogic Forge

View Source
Summary
The 'Azure Start Virtual Machine' detection rule is designed to monitor and analyze the actions taken on virtual machines (VMs) in an Azure cloud environment. By leveraging the Azure activity logs, this rule specifically detects when a virtual machine is started using the action `Microsoft.Compute/virtualMachines/start/action`. This functionality is particularly critical as adversaries may exploit the ability to start and stop VMs for unauthorized purposes, posing significant risks such as bypassing security measures or incurring unexpected costs. The rule utilizes Splunk for parsing and analyzing the cloud data, ensuring a comprehensive view of VM start actions over time. It aggregates data such as the user, account details, source IP, and identity information, making it easier for security teams to identify suspicious behavior linked to potential threats. The rule is associated with the threat actor group Storm-1283 and emphasizes the need for vigilance in cloud infrastructure management, particularly under the outlined technique of modifying cloud compute infrastructure (T1578). This rule helps organizations strike a balance between operational efficiency and security by ensuring that VMs are only utilized when required, thus enabling controlled usage and oversight.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1578
Created: 2024-02-09