heroui logo

CA Policy Removed by Non Approved Actor

Sigma Rules

View Source
Summary
This detection rule monitors for unauthorized modifications to Conditional Access (CA) policies in Azure environments, specifically when a non-approved actor removes a policy. Such actions can indicate potential security breaches, as removing CA policies can weaken access controls and expose organizations to risks. The rule utilizes Azure audit logs to track 'Delete conditional access policy' events, ensuring that any instance of this action is flagged for investigation. False positives may arise from misconfigurations in role permissions, necessitating validation of the circumstances surrounding the change, such as the identity of the user executing the action, the user agent being utilized, and the hostname from which the changes are made. The overall goal is to maintain stringent access controls and prevent unauthorized changes that could compromise security posture.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Application Log
  • User Account
Created: 2022-07-19