
Summary
The detection rule titled 'Change to Authentication Method' focuses on identifying alterations made to user authentication mechanisms within cloud environments, specifically Azure. Such modifications may indicate potential malicious activity, where an attacker could be attempting to establish persistent access to compromised accounts. The rule leverages Azure's audit logs to monitor operations related to user management, particularly changes to registered security information associated with user accounts. The criteria for triggering this rule is defined by examining logged events categorized under 'UserManagement' where the operation 'User registered security info' is recorded by the service 'Authentication Methods'. The detection methodology relies on a straightforward selection condition that alerts on any incident meeting these parameters. Therefore, when such activities are flagged, it warrants further investigation to determine if unauthorized changes have been made, indicative of credential compromise, persistence strategies, or evasion of detection mechanisms.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- User Account
- Application Log
Created: 2021-10-10