heroui logo

App Assigned To Azure RBAC/Microsoft Entra Role

Sigma Rules

View Source
Summary
This rule aims to detect events where service principals (representing applications) are assigned roles in Azure Active Directory or Azure Role-Based Access Control (RBAC). It specifically looks for actions related to the assignment of roles, especially sensitive roles like global administrator or subscription owner, which can significantly escalate the privileges of an application in Azure. The detection logic focuses on the properties of audit logs related to app role assignments contingent on the types of target resources involved, and it establishes triggers based on specific message patterns indicating role assignments. The potential for misuse in cases of privilege escalation is underscored by the rule, thus marking it as a medium-level concern. False positives may occur when an app's permissions are legitimately required, warranting the review of such cases to avoid unnecessary alarms.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • Service
  • Application Log
Created: 2022-07-19