heroui logo

CA Policy Updated by Non Approved Actor

Sigma Rules

View Source
Summary
This detection rule aims to monitor and alert on unauthorized changes to conditional access policies in Azure Active Directory. The focus is to determine if the actor initiating the policy updates is approved to perform such changes. It involves reviewing the modified properties, particularly comparing the 'old' versus 'new' values of the policy settings. This rule is particularly important for maintaining security governance by ensuring that only legitimate users can alter sensitive access controls, thus preventing potential abuse or inadvertent misconfigurations that could weaken security posture.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • Cloud Service
  • Application Log
  • User Account
Created: 2022-07-19