heroui logo

User Added To Group With CA Policy Modification Access

Sigma Rules

View Source
Summary
This rule is designed to monitor and alert security teams when a user is added to a group that possesses Conditional Access (CA) policy modification rights within an Azure environment. The detection logic focuses on the specific event message indicating that a member has been added to a group. As the addition of users to these privileged groups can be indicative of an attempt to manipulate access controls or escalate privileges, it is critical to track these changes. The rule captures events from Azure Audit Logs, where changes to group memberships can be logged. This ensures that any unauthorized or unusual access patterns can be scrutinized quickly, providing organizations with a chance to respond to potential malicious activities. False positives might occur when legitimate users are removed from groups but approved actions have occurred, necessitating careful review and prioritization by security analysts.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Group
  • Application Log
Created: 2022-08-04