
Summary
The detection rule identifies instances when the access keys for Azure Storage Accounts are regenerated, which is a critical security event. Generating new access keys may indicate an attempt by adversaries to gain unauthorized access to sensitive resources, which could lead to potential data breaches or service disruptions. The rule captures events over the past 25 minutes by analyzing Azure activity logs for the specific operation name that indicates key regeneration. Successful operations raise alerts for investigation, particularly when performed by unfamiliar users, hosts, or from unexpected locations. To reduce false positives, the rule accommodates normal administrative key rotations and other routine processes contingent on appropriate tagging or exception processes. The associated keywords for quick identification include Azure, Storage Account, Key Regeneration, Security, and Monitoring.
Categories
- Cloud
- Identity Management
Data Sources
- Cloud Service
- Application Log
- Network Traffic
ATT&CK Techniques
- T1528
Created: 2020-08-19