heroui logo

Anomalous Token

Sigma Rules

View Source
Summary
The 'Anomalous Token' detection rule is designed to identify instances of unusual behavior related to authentication tokens within the Azure environment. This includes the detection of tokens that exhibit abnormal characteristics, such as an unusually long lifespan or tokens that are generated or used from unfamiliar geographic locations. Such anomalies may indicate potential security risks, including compromised credentials or unauthorized access attempts. This detection rule relies on Azure's risk event types to filter relevant activities and generate alerts based on the predefined selection criteria for anomalous tokens. When a session is flagged as containing an anomalous token, security teams are encouraged to investigate these sessions in conjunction with other sign-in events associated with the affected user to mitigate potential security breaches. Given the critical nature of these alerts, this rule is categorized at a high alert level, signaling the necessity for immediate attention.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
Created: 2023-08-07