heroui logo

Databricks Metastore Admin Privilege Granted

Panther Rules

View Source
Summary
Detects when Databricks Unity Catalog metastore admin privileges are granted, either via direct metastore ownership changes or by adding a principal to metastore-admin groups. Metastore admins have extensive control over data access and governance policies, so unauthorized elevation can enable data exfiltration or policy circumvention. The rule correlates Unity Catalog/Audit logs showing ownership changes (updateMetastore with a new owner) or additions to privileged groups (addPrincipalToGroup to metastore-admins or addPrincipalsToGroup to unity-catalog-admins). It aims to identify privilege escalation involving metastore administration and Unity Catalog governance. Key detection logic includes: monitoring for ownership transfers and membership additions to admin groups, emphasizing events within Databricks Aduit logs (Databricks.Audit). The MITRE ATT&CK mapping aligns with Account Discovery (T1098) via privileged account changes. Runbooks guide immediate validation, while tests illustrate expected positive and negative matches to validate detections over time (e.g., 90-day window) and post-privilege access window (6 hours).
Categories
  • Identity Management
  • Cloud
  • Application
Data Sources
  • Group
  • Application Log
ATT&CK Techniques
  • T1098
Created: 2026-04-01