
Summary
This detection rule targets failed sign-in attempts in Azure where the failure is due to Conditional Access policy requirements not being met. It establishes a baseline threshold for sign-in failures marked with a ResultType of 53003, which indicates that the sign-in was blocked by Conditional Access. The rule operates by monitoring the conditions set for sign-in logs in Azure, specifically looking for instances of users being denied access as a result of conditional access controls. This is critical for identifying potential misconfigurations or unauthorized access attempts that may occur when users do not comply with the established access conditions. The rule allows security teams to respond to suspicious patterns of access denial that could indicate larger issues with privilege management or account security. The rule is classified with a high severity level, highlighting the importance of addressing sign-in failures promptly to ensure compliance and security integrity.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2022-06-01