heroui logo

Azure Network Security Configuration Modified or Deleted

Sigma Rules

View Source
Summary
This detection rule monitors modifications or deletions to Azure network security configurations. Specifically, it captures operations related to Network Security Groups (NSGs) such as writing or deleting NSGs and their associated security rules. The rule is aimed at identifying unauthorized changes that could pose a security risk to the cloud infrastructure. Changes that involve NSGs are critical, as they dictate the flow of traffic to and from resources within a virtual network. The detection leverages Azure activity logs, and operators are encouraged to validate the legitimacy of changes made, particularly by unfamiliar users or user accounts outside the expected administrative purview. The false positive section suggests that certain activities performed by designated administrators may need separate handling to avoid improper alerts. If the modification or deletion activities are common in certain scenarios, those specific cases can be exempted from triggering alerts.
Categories
  • Cloud
  • Azure
  • Infrastructure
Data Sources
  • Cloud Service
  • Network Traffic
  • Application Log
Created: 2021-08-08