
Summary
This rule is designed to monitor and alert on the deletion of applications within Azure. It specifically looks for events logged under Azure Activity Logs that indicate an application has been deleted. The detection logic focuses on identifying log entries that include messages such as 'Delete application' or 'Hard Delete application'. This is crucial for maintaining security and oversight in cloud environments, as unauthorized deletions can signify potential attack vectors, such as defense evasion tactics used by threat actors. After identifying such activity, the response team can investigate whether the deletion was legitimate or if it warrants further examination for potential security incidents.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- Logon Session
Created: 2021-09-03