
Summary
The rule titled 'Azure Information Gathering' is designed to detect reconnaissance activities conducted by adversaries looking to gather critical information about Azure resources and accounts. It collects data by executing a variety of Azure commands aimed at retrieving details on directory roles, users, groups, service principals, devices, and resources within Azure. These commands include 'Get-AzureADDirectoryRole', 'Get-AzRoleAssignment', 'Get-AzADUser', and others, which are effective for extracting a comprehensive view of the cloud environment's configuration and identity management. By compiling results into a structured table and applying statistical analyses to event occurrences, the rule identifies anomalous patterns indicative of potential compromise or unauthorized discovery. This approach aligns with techniques focused on infrastructure discovery, account discovery, and service discovery in cloud environments. It highlights multiple accesses to sensitive Azure resources within a brief period, potentially signaling malicious intent.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Application Log
- Network Traffic
ATT&CK Techniques
- T1580
- T1087.004
- T1526
Created: 2024-02-09