heroui logo

Azure Storage Account Key Regenerated

Panther Rules

View Source
Summary
This detection rule monitors for the regeneration of access keys for Azure storage accounts, a critical activity that can signify both normal operations and potential malicious behavior aimed at credential manipulation or persistence. Key regeneration could be performed by legitimate administrators, but it may also indicate an unauthorized attempt to gain access or maintain persistence within a cloud environment. The rule is enabled within Azure Monitor Activity logs to assess various parameters including the caller's IP address, operation details, and timestamps to identify suspicious patterns around key regeneration events. If an unusual pattern is detected, a multi-step investigation through historical logs and IP reputation checks is recommended to verify the legitimacy of the operations. Alerts generated by this rule are categorized as informational and may pertain to risk factors outlined in the MITRE ATT&CK framework for lateral movement and credential access.
Categories
  • Cloud
  • Azure
Data Sources
  • Cloud Service
  • Logon Session
ATT&CK Techniques
  • T1098
Created: 2026-01-14