Azure Service Principal was assigned a role

Set up the azure integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect an Azure service principal being assigned an Azure role.

Strategy

Monitor Azure Activity logs for the following operations:

  • @evt.name:"MICROSOFT.AUTHORIZATION/ROLEASSIGNMENTS/WRITE"
  • @properties.requestbody:*ServicePrincipal*

Triage and response

  1. Determine if this activity is legitimate by investigating the:
  • Source IP of this activity: {{@network.client.ip}}
  • The user who made this request: @identity.claims.name
  • The role that was assigned to the application or service principal.
  1. If this user should not be assigning this Azure role and if the service principal should not be assigned this role:
  • Revoke access of compromised credentials.
  • Remove unauthorized app registration and/or service principal.
  • Investigate other activities performed by the source IP {{@network.client.ip}} in the IP Investigation Dashboard.
  • Investigate other activities performed by the user {{@usr.id}} in the User Investigation Dashboard.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc