
Summary
This detection rule monitors Azure Active Directory (Azure AD) for the enabling of certificate-based authentication methods. It specifically triggers when there is an operation called 'Authentication Methods Policy Update' and checks if any modifications to the 'AuthenticationMethodsPolicy' have occurred within the targeted resources. Such changes may indicate a shift towards using certificate-based authentication, which could have implications for security and user access management. This rule is essential for identifying potential unauthorized changes that could allow for persistence or privilege escalation attacks. It is designed to provide alerts on medium-level severity to help safeguard against misuse of authentication policies.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Cloud Service
- Application Log
Created: 2024-03-26