
Summary
This detection rule is designed to monitor and alert security teams when a user is removed from a group that has Conditional Access (CA) policy modification rights within an Azure environment. The objective is to prevent potential unauthorized access to sensitive configurations that could lead to a security breach. When a user with the ability to modify CA policies is removed from their group, it may indicate malicious activity or a policy violation. This rule utilizes logs from Azure's audit logs to detect specific messages signaling a removal event. If the message correlates to 'Remove member from group', the rule triggers an alert. Organizations can configure their alerting mechanisms to effectively respond and investigate such activities for proper incident response.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Group
- Cloud Service
- Application Log
Created: 2022-08-04