
Summary
The Azure Update MFA detection rule is designed to identify instances where a user updates their security information, specifically related to multi-factor authentication (MFA) in an Azure environment. This can be an important indicator of potential unauthorized access or manipulation, especially if the threat actors associated with such activities are known to exploit vulnerabilities in user account management. The rule employs a logic query in Splunk that captures relevant data from Azure's cloud services and IAM (Identity Access Management) logs. It focuses on the event where a user registers or updates their security info, capturing metadata like the user, account, operational region, source IP, and action performed. By aggregating this data, the rule helps in recognizing abnormal behaviors that could signal account compromise attempts. This type of activity aligns with the tactics highlighted under the MITRE ATT&CK framework, specifically the account manipulation technique (T1098) associated with persistence threats. The detection content leverages Azure activity logs to provide a clear view of user actions in the cloud environment, ensuring accountability and monitoring against malicious behavior.
Categories
- Cloud
- Azure
Data Sources
- Cloud Service
- User Account
- Application Log
ATT&CK Techniques
- T1098
Created: 2024-02-09