
Summary
This rule detects unauthorized elevation of a user's permissions to manage all Azure subscriptions. It monitors Azure Activity Logs, specifically looking for the operation `MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION`, which indicates a change in access levels. Such elevations should be closely scrutinized; if they occur outside of a planned administrative process, they may indicate potential malicious activity or compromise. Attackers could exploit these elevated privileges to gain access to sensitive resources within the Azure environment, posing a significant risk to cloud security. Proper logging and monitoring of these operations are crucial for maintaining a secure Azure infrastructure.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- Application Log
Created: 2021-11-26