heroui logo

O365 Add App Role Assignment Grant User

Splunk Security Content

View Source
Summary
This rule monitors for the addition of application role assignments to users in an Office 365 environment, specifically identifying the operation of adding app role assignment grants. Such actions can represent unauthorized privilege escalations, wherein a user may gain enhanced access to critical resources without appropriate authorization. This behavior could potentially facilitate elevated permissions for attackers, allowing for unauthorized data access or manipulation within the Office 365 environment. The detection utilizes the `o365_management_activity` dataset, focusing on identifying activities related to Azure Active Directory operations, particularly the 'Add app role assignment grant to user' event. Implementing this rule requires the Splunk Microsoft Office 365 add-on, which processes the necessary data for accurate monitoring. The implementation underscores the importance of monitoring user privilege changes, as these may enable malicious activities that compromise the integrity of the cloud services and data integrity.
Categories
  • Cloud
  • Identity Management
  • Other
Data Sources
  • Pod
  • Container
  • User Account
  • Cloud Service
  • Active Directory
ATT&CK Techniques
  • T1136.003
  • T1136
Created: 2024-11-14