
Summary
This detection rule identifies when public read access is allowed for containers and blobs in Azure Storage, which can lead to unauthorized data exposure. By default, Azure Storage prohibits public access to blob data, but users with appropriate permissions can modify this setting. The logic checks for instances where the 'allowBlobPublicAccess' property is set to true in requests, indicating a change in public access permissions. The data is extracted using a series of Splunk commands which filter the logs for relevant information such as the source IP, user details, and the nature of the request. This rule is particularly important for monitoring compliance and security in cloud storage environments, ensuring that sensitive information is not unintentionally exposed to the public.
Categories
- Cloud
- Azure
- Infrastructure
Data Sources
- Cloud Service
- Network Traffic
- Application Log
ATT&CK Techniques
- T1530
Created: 2024-02-09