heroui logo

O365 Multiple Service Principals Created by User

Splunk Security Content

View Source
Summary
This detection rule identifies the creation of multiple unique OAuth applications by a single user within a 10-minute timeframe in an Office 365 environment. The analytic leverages logs from the Unified Audit Log, specifically the 'Add service principal' operation in Azure Active Directory. The importance of this rule lies in its ability to signal a potentially compromised user account or unauthorized actions that could result in broader security implications, such as privilege escalation or persistent access for an attacker. The detection utilizes Splunk's search capabilities to aggregate events, count unique applications created by a user, and filter results based on relevant metrics like user type, ensuring that the analysis is tailored to human users rather than automated processes.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Pod
  • User Account
  • Service
ATT&CK Techniques
  • T1136
  • T1136.003
Created: 2024-11-14