
Summary
The 'O365 Service Principal Privilege Escalation' detection rule is designed to identify instances where an Azure Service Principal elevates its own privileges by creating a new app role assignment for itself. This is a possible malicious activity that can lead to unauthorized access and control over services in the Azure environment. The detection is accomplished through the monitoring of O365 Management activity logs, specifically focusing on operations that indicate an app role has been added to a service principal successfully. The search leverages Splunk's search capabilities to parse the log data received from the O365 API, using filters to capture relevant events. It provides insights into the time and nature of the privilege escalation, as well as details about the service principal involved. This helps teams to investigate potential abuses of service principals that may indicate an ongoing attack or internal misuse.
Categories
- Cloud
- Identity Management
Data Sources
- Pod
- User Account
- Cloud Service
ATT&CK Techniques
- T1098.003
- T1098
Created: 2025-01-06