heroui logo

Data Exfiltration to Unsanctioned Apps

Sigma Rules

View Source
Summary
This detection rule identifies unauthorized data exfiltration attempts by monitoring user activities within unsanctioned applications, as reported by Microsoft Cloud App Security. The rule specifically looks for events where a user or IP address interacts with an unsanctioned app to transfer data that may resemble attempts to move sensitive information outside the organization. A successful detection occurs when these actions are logged with "Data exfiltration to unsanctioned apps" as the event name in the Security Compliance Center. The focus is on maintaining data integrity and security by flagging such anomalous behavior, thus allowing security teams to respond to potential breaches promptly.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Cloud Service
  • Application Log
Created: 2021-08-23