
Summary
This detection rule monitors for user additions to Global or Device Administrator roles within Azure Active Directory. Through the Azure Audit Logs, it specifically looks for operations related to role management where users are added to critical roles that enhance permissions, which can be leveraged for privilege escalation or defense evasion. The rule focuses on operations categorized under 'RoleManagement' and checks for specific operation names like 'Add' or 'member to role', targeting resource IDs corresponding to these sensitive roles. Alerts generated by this rule serve as critical indications of potential unauthorized changes in user permissions that could compromise security. Users added to such roles require immediate investigation to ensure they are legitimate and authorized, hence the high-level alert status assigned to this rule. Alerts are raised whenever the specified conditions are met, indicating potential unauthorized access scenarios within the cloud environment.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- Application Log
Created: 2022-06-28